Important Notice: Security vulnerability of Google Chrome browser and Cisco products (updated at 26 Sep 2025)
關於 Google Chrome 瀏覽器和Cisco產品的安全漏洞通告 (更新於 2025年9月26日)

資訊安全警示 Information Security Alert
To: All Users
As informed by the Cybersecurity Incident Alert and Response Centre (CARIC), Google have recently issued security vulnerability about Chrome browser. This high-risk vulnerability is widely exploited.
- Please update to Google Chrome version 140.0.7339.185 (Linux) or later, 140.0.7339.185/.186 (Mac/ Windows) or later
For more details, please refer to: https://chromereleases.googleblog.com/2025/09/
Steps to update Google Chrome browser
- Open your Google Chrome browser on your desktop.
- Click the three vertical dots in the upper right corner to open the dropdown menu.
- Select “Settings“.
- Click “About Chrome” on the left-hand sidebar.
- Chrome will automatically check for updates or you can click the button “Update Google Chrome”.
- Restart the Chrome.
In addition, Cisco have recently issued security vulnerabilities about their multiple products. Remote attackers can exploit these vulnerabilities to remotely execute arbitrary code on the target system, elevate privileges to root, or trigger a denial of service condition; this high-risk vulnerability is also being widely exploited.
The affected products are: Cisco Secure Firewall Adaptive Security Appliance (ASA), Cisco Secure Firewall Threat Defense (FTD), Cisco IOS and Cisco IOS XE.
Details of the vulnerabilities:
- Cisco ASA and Cisco FTD Remote Code Execution Vulnerabilities
- Cisco IOS and Cisco IOS XE Remote Code Execution Vulnerability
- Cisco IOS and Cisco FTD Trigger Denial-of-service Vulnerability
- Cisco IOS XE Cross-Site Scripting Execution Vulnerability
For more details, please refer to: https://sec.cloudapps.cisco.com/security/center/publicationListing.x
If the relevant affected products are used, please install the security updates released by Cisco as soon as possible.
Reference
- How to download and install software in a secure manner?
- Basic Knowledge of Online Safety and Security
- Other Information Security Tips
Should you have any enquiries, please feel free to contact ICTO Help Desk.
ICTO Help Desk
Location : Room 2085, 2/F, Central Teaching Building (E5), eMap
Telephone : 8822 8600
email : icto.helpdesk@um.edu.mo
Information and Communication Technology Office
各位用戶:
資訊及通訊科技部接獲網絡安全事故預警及應急中心的通知,Google官方近日發出有關於 Chrome 瀏覽器的安全漏洞,該高危漏洞亦正在被廣泛利用。
-
請更新至 Google Chrome 140.0.7339.185 (Linux) 或之後版本, 140.0.7339.185/.186 (Mac/ Windows) 或之後版本
有關詳情可參考:https://chromereleases.googleblog.com/2025/09/
更新Google Chrome瀏覽器”步驟
- 在電腦上開啟 Chrome;
- 按下右上方的 [更多](垂直三點圖示) ;
- 按下 [設定] ;
- 在左方菜單,按下[關於 Google Chrome];
- Chrome瀏覽器會自動進行更新,或可手動按下 [更新 Google Chrome] 進行更新;
- 重新啟動Chrome瀏覽器。
另外Cisco官方近日也發出有關多個產品的安全漏洞, 遠端攻擊者可利用該等漏洞,於目標系統遠端執行任意程式碼、提權至 root 權限或觸發阻斷服務狀況;該高危漏洞亦正在被廣泛利用。
受影響產品為:Cisco Secure Firewall Adaptive Security Appliance (ASA), Cisco Secure Firewall Threat Defense (FTD), Cisco IOS 和 Cisco IOS XE。
漏洞詳情:
- Cisco ASA 及 Cisco FTD 遠端程式碼執行漏洞
- Cisco IOS 及 Cisco IOS XE 遠端程式碼執行漏洞
- Cisco ASA 及 Cisco FTD 遠端程式碼執行漏洞
- Cisco ASA 及 Cisco FTD 觸發阻斷服務狀況漏洞
- Cisco IOS XE 跨站指令碼執行漏洞
有關詳情可參考:https://sec.cloudapps.cisco.com/security/center/publicationListing.x
倘有使用相關受影響產品,須盡快安裝由Cisco公司釋出的安全更新。
參考資料
如有任何疑問,請聯絡資訊及通訊科技部服務中心。
服 務 中 心
位置 : 中央教學樓東5座(E5)二樓2085室 (電子地圖)
電話 : 8822 8600
電郵 : icto.helpdesk@um.edu.mo
資訊及通訊科技部