2026年3月11日星期三

微軟每月保安更新 (2026年3月)

微軟每月保安更新 (2026年3月)

發佈日期: 2026年03月14日

風險: 中度風險

類型: 操作系統 - 視窗操作系統

微軟已為產品提供本月保安更新:

 

受影響產品風險程度影響備註
SQL Server中度風險 中度風險權限提升 
Azure中度風險 中度風險權限提升
資料洩露
仿冒
 
視窗中度風險 中度風險權限提升
遠端執行程式碼
資料洩露
繞過保安限制
阻斷服務
仿冒
 
延伸安全性更新 (ESU)中度風險 中度風險權限提升
遠端執行程式碼
資料洩露
繞過保安限制
阻斷服務
仿冒
 
微軟 Office中度風險 中度風險權限提升
資料洩露
仿冒
遠端執行程式碼
 
System Center中度風險 中度風險權限提升 
開發者工具中度風險 中度風險權限提升
阻斷服務
 
Device中度風險 中度風險遠端執行程式碼 
其他中度風險 中度風險權限提升 
開源軟件中度風險 中度風險遠端執行程式碼 
Apps中度風險 中度風險資料洩露 

 

「極高度風險」產品數目:0

「高度風險」產品數目:0

「中度風險」產品數目:11

「低度風險」產品數目:0

整體「風險程度」評估:中度風險


影響

  • 遠端執行程式碼
  • 阻斷服務
  • 權限提升
  • 仿冒
  • 繞過保安限制
  • 資料洩露

受影響之系統或技術

  • SQL Server
  • Azure
  • 視窗
  • 延伸安全性更新 (ESU)
  • 微軟 Office
  • System Center
  • 開發者工具
  • Device
  • 其他
  • 開源軟件
  • Apps

解決方案

在安裝軟體之前,請先瀏覽軟體供應商之網站,以獲得更多詳細資料。

  • 安裝軟件供應商提供的修補程式。

漏洞識別碼


資料來源


相關連結

Microsoft Monthly Security Update (March 2026)

Microsoft Monthly Security Update (March 2026)

Release Date: 14 Mar 2026

RISK: Medium Risk

TYPE: Operating Systems - Windows OS

Microsoft has released monthly security update for their products:

 

Vulnerable ProductRisk LevelImpactsNotes
SQL ServerMedium Risk Medium RiskElevation of Privilege 
AzureMedium Risk Medium RiskElevation of Privilege
Information Disclosure
Spoofing
 
WindowsMedium Risk Medium RiskElevation of Privilege
Remote Code Execution
Information Disclosure
Security Restriction Bypass
Denial of Service
Spoofing
 
Extended Security Updates (ESU)Medium Risk Medium RiskElevation of Privilege
Remote Code Execution
Information Disclosure
Security Restriction Bypass
Denial of Service
Spoofing
 
Microsoft OfficeMedium Risk Medium RiskElevation of Privilege
Information Disclosure
Spoofing
Remote Code Execution
 
System CenterMedium Risk Medium RiskElevation of Privilege 
Developer ToolsMedium Risk Medium RiskElevation of Privilege
Denial of Service
 
DeviceMedium Risk Medium RiskRemote Code Execution 
OtherMedium Risk Medium RiskElevation of Privilege 
Open Source SoftwareMedium Risk Medium RiskRemote Code Execution 
AppsMedium Risk Medium RiskInformation Disclosure 

 

Number of 'Extremely High Risk' product(s): 0

Number of 'High Risk' product(s): 0

Number of 'Medium Risk' product(s): 11

Number of 'Low Risk' product(s): 0

Evaluation of overall 'Risk Level': Medium Risk


Impact

  • Remote Code Execution
  • Denial of Service
  • Elevation of Privilege
  • Spoofing
  • Security Restriction Bypass
  • Information Disclosure

System / Technologies affected

  • SQL Server
  • Azure
  • Windows
  • Extended Security Updates (ESU)
  • Microsoft Office
  • System Center
  • Developer Tools
  • Device
  • Other
  • Open Source Software
  • Apps

Solutions

Before installation of the software, please visit the vendor web-site for more details.

  •  Apply fixes issued by the vendor.

Vulnerability Identifier


Source


Related Link

Aruba 產品多個漏洞

Aruba 產品多個漏洞

發佈日期: 2026年03月11日

風險: 中度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

在Aruba產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發繞過保安限制及遠端執行任意程式碼。


影響

  • 遠端執行程式碼
  • 繞過保安限制

受影響之系統或技術

  • AOS-CX 10.17.xxxx: 10.17.0001 及以下版本
  • AOS-CX 10.16.xxxx: 10.16.1020 及以下版本
  • AOS-CX 10.13.xxxx: 10.13.1160 及以下版本
  • AOS-CX 10.10.xxxx: 10.10.1170 及以下版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Aruba Products Multiple Vulnerabilities

Aruba Products Multiple Vulnerabilities

Release Date: 11 Mar 2026

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Aruba Products. A remote attacker could exploit these vulnerabilities to trigger security restriction bypass and remote code execution on the targeted system.


Impact

  • Remote Code Execution
  • Security Restriction Bypass

System / Technologies affected

  • AOS-CX 10.17.xxxx: 10.17.0001 and below
  • AOS-CX 10.16.xxxx: 10.16.1020 and below
  • AOS-CX 10.13.xxxx: 10.13.1160 and below
  • AOS-CX 10.10.xxxx: 10.10.1170 and below

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

Adobe 每月保安更新 (2026年3月)

Adobe 每月保安更新 (2026年3月)

發佈日期: 2026年03月11日

風險: 中度風險

類型: 用戶端 - 辦公室應用

Adobe已為產品提供本月保安更新:

 

受影響產品風險程度影響備註詳情(包括 CVE)
Adobe Commerce中度風險 中度風險跨網站指令碼
權限提升
繞過保安限制
遠端執行程式碼
資料洩露
阻斷服務
 APSB26-05
Adobe Illustrator中度風險 中度風險遠端執行程式碼
阻斷服務
 APSB26-18
Substance 3D Painter中度風險 中度風險阻斷服務
遠端執行程式碼
 APSB26-25
Adobe Acrobat Reader中度風險 中度風險遠端執行程式碼
權限提升
 APSB26-26
Adobe Premiere Pro中度風險 中度風險遠端執行程式碼 APSB26-28
Adobe Experience Manager中度風險 中度風險跨網站指令碼
遠端執行程式碼
 APSB26-24
Substance 3D Stager中度風險 中度風險遠端執行程式碼 APSB26-29
Adobe DNG Software Development Kit (SDK)中度風險 中度風險遠端執行程式碼
阻斷服務
 APSB26-30

 

「極高度風險」產品數目:0

「高度風險」產品數目:0

「中度風險」產品數目:8

「低度風險」產品數目:0

整體「風險程度」評估:中度風險


影響

  • 遠端執行程式碼
  • 阻斷服務
  • 資料洩露
  • 跨網站指令碼
  • 權限提升
  • 繞過保安限制

受影響之系統或技術

  • Adobe Commerce 2.4.9-alpha3 及以前版本
  • Adobe Commerce 2.4.8‑p3 及以前版本
  • Adobe Commerce 2.4.7-p8 及以前版本
  • Adobe Commerce 2.4.6-p13 及以前版本
  • Adobe Commerce 2.4.5-p15 及以前版本
  • Adobe Commerce 2.4.4-p16 及以前版本
  • Adobe Commerce B2B 1.5.3-alpha3 及以前版本
  • Adobe Commerce B2B 1.5.2‑p3 及以前版本
  • Adobe Commerce B2B 1.4.2-p8 及以前版本
  • Adobe Commerce B2B 1.3.5-p13 及以前版本
  • Adobe Commerce B2B 1.3.4-p15 及以前版本
  • Adobe Commerce B2B 1.3.3-p16 及以前版本
  • Magento Open Source 2.4.9-alpha3
  • Magento Open Source 2.4.8-p3 及以前版本
  • Magento Open Source 2.4.7-p8 及以前版本
  • Magento Open Source 2.4.6-p13 及以前版本
  • Magento Open Source 2.4.5-p15 及以前版本
  • Illustrator 2025 29.8.4 及以前版本
  • Illustrator 2026 30.1 及以前版本
  • Adobe Substance 3D Painter 11.1.2 及以前版本
  • Acrobat DC 25.001.21265 及以前版本
  • Acrobat Reader DC 25.001.21265 及以前版本
  • Acrobat 2024 Win - 24.001.30307 及以前版本
  • Acrobat 2024 Mac - 24.001.30308 及以前版本
  • Adobe Premiere Pro 25.5 及以前版本
  • Adobe Experience Manager (AEM) AEM Cloud Service (CS)
  • Adobe Experience Manager (AEM) 6.5 LTS SP1 及以前版本
  • Adobe Experience Manager (AEM) 6.5.SP23 及以前版本
  • Adobe Substance 3D Stager 3.1.7 及以前版本
  • Adobe DNG Software Development Kit (SDK) DNG SDK 1.7.1 build 2471 及以前版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

  • 安裝供應商提供的修補程式。個別產品詳情可參考上表「詳情」一欄或執行軟件更新。

漏洞識別碼


資料來源


相關連結

Adobe Monthly Security Update (March 2026)

Adobe Monthly Security Update (March 2026)

Release Date: 11 Mar 2026

RISK: Medium Risk

TYPE: Clients - Productivity Products

Adobe has released monthly security update for their products:

 

Vulnerable ProductRisk LevelImpactsNotesDetails (including CVE)
Adobe CommerceMedium Risk Medium RiskCross-site Scripting
Elevation of Privilege
Security Restriction Bypass
Remote Code Execution
Information Disclosure
Denial of Service
 APSB26-05
Adobe IllustratorMedium Risk Medium RiskRemote Code Execution
Denial of Service
 APSB26-18
Substance 3D PainterMedium Risk Medium RiskDenial of Service
Remote Code Execution
 APSB26-25
Adobe Acrobat ReaderMedium Risk Medium RiskRemote Code Execution
Elevation of Privilege
 APSB26-26
Adobe Premiere ProMedium Risk Medium RiskRemote Code Execution APSB26-28
Adobe Experience ManagerMedium Risk Medium RiskCross-site Scripting
Remote Code Execution
 APSB26-24
Substance 3D StagerMedium Risk Medium RiskRemote Code Execution APSB26-29
Adobe DNG Software Development Kit (SDK)Medium Risk Medium RiskRemote Code Execution
Denial of Service
 APSB26-30

 

Number of 'Extremely High Risk' product(s): 0

Number of 'High Risk' product(s): 0

Number of 'Medium Risk' product(s): 8

Number of 'Low Risk' product(s): 0

Evaluation of overall 'Risk Level': Medium Risk


Impact

  • Remote Code Execution
  • Denial of Service
  • Information Disclosure
  • Cross-Site Scripting
  • Elevation of Privilege
  • Security Restriction Bypass

System / Technologies affected

  • Adobe Commerce 2.4.9-alpha3 and earlier versions
  • Adobe Commerce 2.4.8‑p3 and earlier versions
  • Adobe Commerce 2.4.7-p8 and earlier versions
  • Adobe Commerce 2.4.6-p13 and earlier versions
  • Adobe Commerce 2.4.5-p15 and earlier versions
  • Adobe Commerce 2.4.4-p16 and earlier versions
  • Adobe Commerce B2B 1.5.3-alpha3 and earlier versions
  • Adobe Commerce B2B 1.5.2‑p3 and earlier versions
  • Adobe Commerce B2B 1.4.2-p8 and earlier versions
  • Adobe Commerce B2B 1.3.5-p13 and earlier versions
  • Adobe Commerce B2B 1.3.4-p15 and earlier versions
  • Adobe Commerce B2B 1.3.3-p16 and earlier versions
  • Magento Open Source 2.4.9-alpha3
  • Magento Open Source 2.4.8-p3 and earlier versions
  • Magento Open Source 2.4.7-p8 and earlier versions
  • Magento Open Source 2.4.6-p13 and earlier versions
  • Magento Open Source 2.4.5-p15 and earlier versions
  • Illustrator 2025 29.8.4 and earlier versions
  • Illustrator 2026 30.1 and earlier versions
  • Adobe Substance 3D Painter 11.1.2 and earlier versions
  • Acrobat DC 25.001.21265 and earlier versions
  • Acrobat Reader DC 25.001.21265 and earlier versions
  • Acrobat 2024 Win - 24.001.30307 and earlier versions
  • Acrobat 2024 Mac - 24.001.30308 and earlier versions
  • Adobe Premiere Pro 25.5 and earlier versions
  • Adobe Experience Manager (AEM) AEM Cloud Service (CS)
  • Adobe Experience Manager (AEM) 6.5 LTS SP1 and earlier versions
  • Adobe Experience Manager (AEM) 6.5.SP23 and earlier versions
  • Adobe Substance 3D Stager 3.1.7 and earlier versions
  • Adobe DNG Software Development Kit (SDK) DNG SDK 1.7.1 build 2471 and earlier versions

Solutions

Before installation of the software, please visit the vendor web-site for more details.

  • Apply fixes issued by the vendor. Please refer to 'Details' column in the above table for details of individual product update or run software update.

Vulnerability Identifier


Source


Related Link

Zoom 產品多個漏洞

Zoom 產品多個漏洞

發佈日期: 2026年03月11日

風險: 中度風險

類型: 用戶端 - 辦公室應用

於 Zoom 產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發權限提升。


影響

  • 權限提升

受影響之系統或技術

  • Zoom Meeting SDK for Windows 6.6.x 分支中 6.6.11 之前的版本
  • Zoom Rooms for Windows 6.6.0 之前的版本
  • Zoom Rooms for Windows 6.6.5 之前的版本
  • Zoom Workplace for Windows 6.6.0 之前的版本
  • Zoom Workplace for Windows 6.6.x 分支中 6.6.11 之前的版本
  • Zoom Workplace VDI Client for Windows 6.6.10 版本 (低於 6.6.x 分支的 VDI 版本不受影響)
  • Zoom Workplace VDI Client for Windows 在各自分支中低於 6.4.15, 6.4.17, 6.5.13, 6.5.15 和 6.6.10 的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之官方網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

 


漏洞識別碼


資料來源


相關連結

Zoom Products Multiple Vulnerabilities

Zoom Products Multiple Vulnerabilities

Release Date: 11 Mar 2026

RISK: Medium Risk

TYPE: Clients - Productivity Products

Multiple vulnerabilities were identified in Zoom Products. A remote attacker could exploit some of these vulnerabilities to trigger elevation of privilege on the targeted system.


Impact

  • Elevation of Privilege

System / Technologies affected

  • Zoom Meeting SDK for Windows before version 6.6.11 in the 6.6.x branch
  • Zoom Rooms for Windows before version 6.6.0
  • Zoom Rooms for Windows before version 6.6.5
  • Zoom Workplace for Windows before version 6.6.0
  • Zoom Workplace for Windows before version 6.6.11 in the 6.6.x branch
  • Zoom Workplace VDI Client for Windows version 6.6.10 specifically (VDI branches below 6.6.x are not affected)
  • Zoom Workplace VDI Client for Windows before versions 6.4.15, 6.4.17, 6.5.13, 6.5.15, and 6.6.10 in their respective branch

Solutions

Before installation of the software, please visit the vendor web-site for more details.

Apply fixes issued by the vendor:

 


Vulnerability Identifier


Source


Related Link

2026年3月9日星期一

Microsoft Edge 多個漏洞

Microsoft Edge 多個漏洞

發佈日期: 2026年03月09日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Microsoft Edge 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況、繞過保安限制、資料篡改及洩露敏感資料。


Microsoft Edge Multiple Vulnerabilities

Microsoft Edge Multiple Vulnerabilities

Release Date: 9 Mar 2026

RISK: Medium Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Microsoft Edge. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation and sensitive information disclosure on the targeted system.


pac4j-jwt 繞過保安限制漏洞

pac4j-jwt 繞過保安限制漏洞

發佈日期: 2026年03月09日

風險: 中度風險

類型: 伺服器 - 網站伺服器

於 pac4j-jwt 發現一個漏洞。遠端攻擊者可利用此漏洞,於目標系統觸發繞過保安限制。

 

注意:

CVE-2026-29000 的概念驗證碼已被公開。攻擊者若掌握伺服器的 RSA 公鑰,即可建立包含任意主題和角色聲明的 JWE 封裝的 PlainJWT,從而繞過簽章驗證,以包含管理員在內的任何使用者身分進行驗證。因此,風險等級被評為中等風險。


影響

  • 繞過保安限制

受影響之系統或技術

  • 如果您使用的是 4.x 系列版本:請升級至 4.5.9(或更高版本)

  • 如果您使用的是 5.x 系列版本:請升級至 5.7.9(或更高版本)

  • 如果您使用的是 6.x 系列版本:請升級至 6.3.3(或更高版本)


解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

pac4j-jwt Security Restriction Bypass Vulnerability

pac4j-jwt Security Restriction Bypass Vulnerability

Release Date: 9 Mar 2026

RISK: Medium Risk

TYPE: Servers - Web Servers

A vulnerability has been identified in pac4j-jwt. A remote attacker could exploit this vulnerability to trigger security restriction bypass on the targeted system.

 

Note:

Proof of Concept exploit code Is publicly available for CVE-2026-29000. Attackers who possess the server's RSA public key can create a JWE-wrapped PlainJWT with arbitrary subject and role claims, bypassing signature verification to authenticate as any user including administrators. Hence, the risk level is rated as Medium Risk.


Impact

  • Security Restriction Bypass

System / Technologies affected

  • If you use the 4.x line: upgrade to 4.5.9 (or newer)
  • If you use the 5.x line: upgrade to 5.7.9 (or newer)
  • If you use the 6.x line: upgrade to 6.3.3 (or newer)

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

2026年3月6日星期五

Google Chrome 多個漏洞

Google Chrome 多個漏洞

發佈日期: 2026年03月06日

風險: 中度風險

類型: 用戶端 - 瀏覽器

於 Google Chrome 發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發遠端執行任意程式碼、阻斷服務狀況、繞過保安限制、資料篡改及洩露敏感資料。

 

影響

  • 資料洩露
  • 篡改
  • 繞過保安限制
  • 阻斷服務
  • 遠端執行程式碼

受影響之系統或技術

  • Google Chrome 145.0.7632.159 (Linux) 之前的版本
  • Google Chrome 145.0.7632.159/160 (Mac) 之前的版本
  • Google Chrome 145.0.7632.159/160 (Windows) 之前的版本

解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

安裝軟件供應商提供的修補程式:

  • 更新至 145.0.7632.159 (Linux) 或之後版本
  • 更新至 145.0.7632.159/160 (Mac) 或之後版本
  • 更新至 145.0.7632.159/160 (Windows) 或之後版本

漏洞識別碼


資料來源


相關連結

Google Chrome Multiple Vulnerabilities

Google Chrome Multiple Vulnerabilities

Release Date: 6 Mar 2026

RISK: Medium Risk

TYPE: Clients - Browsers

Multiple vulnerabilities were identified in Google Chrome. A remote attacker could exploit some of these vulnerabilities to trigger remote code execution, denial of service condition, security restriction bypass, data manipulation and sensitive information disclosure on the targeted system.


Impact

  • Information Disclosure
  • Data Manipulation
  • Security Restriction Bypass
  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Google Chrome prior to 145.0.7632.159 (Linux)
  • Google Chrome prior to 145.0.7632.159/160 (Mac)
  • Google Chrome prior to 145.0.7632.159/160 (Windows)

Solutions

Before installation of the software, please visit the software vendor web-site for more details.

Apply fixes issued by the vendor:

  • Update to version 145.0.7632.159 (Linux) or later
  • Update to version 145.0.7632.159/160 (Mac) or later
  • Update to version 145.0.7632.159/160 (Windows) or later

Vulnerability Identifier


Source


Related Link

2026年3月5日星期四

Aruba Products Multiple Vulnerabilities

Aruba Products Multiple Vulnerabilities

Release Date: 5 Mar 2026

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Aruba Products. A remote attacker could exploit these vulnerabilities to trigger denial of service condition, security restriction bypass, sensitive information disclosure and spoofing on the targeted system.


Impact

  • Spoofing
  • Information Disclosure
  • Security Restriction Bypass
  • Denial of Service

System / Technologies affected

  • AOS-8.10.x.x: 8.10.0.21 and below
  • AOS-8.12.x.x: 8.12.0.6 and below
  • AOS-8.13.x.x: 8.13.1.1 and below
  • AOS-10.4.x.x: 10.4.1.10 and below
  • AOS-10.7.x.x: 10.7.2.2 and below
  • AOS-10.8.x.x: 10.8.0.0 and below

 

HPE Aruba Networking End of Maintenance (EoM) Software Version(s):

 

  • AOS-10.6.x.x: all
  • AOS-10.5.x.x: all
  • AOS-10.3.x.x: all
  • AOS-8.12.x.x: all
  • AOS-8.11.x.x: all
  • AOS-8.9.x.x: all
  • AOS-8.8.x.x: all
  • AOS-8.7.x.x: all
  • AOS-8.6.x.x: all
  • AOS-6.5.4.x: all
  • SD-WAN 8.7.0.0-2.3.0.x: all
  • SD-WAN 8.6.0.4-2.2.x.x: all

Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:

Note: End of Maintenance (EoM) versions are not addressed by the provided solution.


Vulnerability Identifier


Source


Related Link

思科產品多個漏洞

思科產品多個漏洞

發佈日期: 2026年03月05日

風險: 中度風險

類型: 保安軟件及應用設備 - 保安軟件及應用設備

於思科產品發現多個漏洞。遠端攻擊者可利用這些漏洞,於目標系統觸發阻斷服務狀況、權限提升、彷冒、遠端執行任意程式碼、洩露敏感資料、跨網站指令碼、資料篡改及繞過保安限制。


影響

  • 阻斷服務
  • 繞過保安限制
  • 遠端執行程式碼
  • 跨網站指令碼
  • 資料洩露
  • 仿冒
  • 篡改
  • 權限提升

受影響之系統或技術

  • Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Cisco Secure Firewall Management Center (FMC)
  • Cisco Secure Firewall Threat Defense (FTD)
  • ClamAV

請參考供應商發佈的連結以了解受影響的版本:


解決方案

在安裝軟體之前,請先瀏覽供應商之網站,以獲得更多詳細資料。

 

安裝供應商提供的修補程式:


漏洞識別碼


資料來源


相關連結

Cisco Products Multiple Vulnerabilities

Cisco Products Multiple Vulnerabilities

Release Date: 5 Mar 2026

RISK: Medium Risk

TYPE: Security software and application - Security Software & Appliance

Multiple vulnerabilities were identified in Cisco products. A remote attacker could exploit some of these vulnerabilities to trigger denial of service condition, elevation of privilege, spoofing, remote code execution, sensitive information disclosure, cross-site scripting, data manipulation and security restriction bypass on the targeted system.


Impact

  • Denial of Service
  • Security Restriction Bypass
  • Remote Code Execution
  • Cross-Site Scripting
  • Information Disclosure
  • Spoofing
  • Data Manipulation
  • Elevation of Privilege

System / Technologies affected

  • Cisco Secure Firewall Adaptive Security Appliance (ASA)
  • Cisco Secure Firewall Management Center (FMC)
  • Cisco Secure Firewall Threat Defense (FTD)
  • ClamAV

For affected versions, please refer to the link issued by the vendor:


Solutions

Before installation of the software, please visit the vendor web-site for more details.

 

Apply fixes issued by the vendor:


Vulnerability Identifier


Source


Related Link

微軟每月保安更新 (2026年3月)

微軟每月保安更新 (2026年3月) 發佈日期: 2026年03月14日 風險: 中度風險 類型: 操作系統 - 視窗操作系統 微軟已為產品提供本月保安更新:   受影響產品 風險程度 影響 備註 SQL Server 中度風險 ...