東京都デジタルサービス局から以下の製品に関する注意喚起がありました。
配信日は1/14、21です。
概要(対象:システム管理者)
F5製品の脆弱性に関する注意喚起
https://my.f5.com/manage/s/article/K000159546
https://my.f5.com/manage/s/article/K000159544
https://my.f5.com/manage/s/article/K000159018
NVIDIA製品の脆弱性に関する注意喚起
https://nvidia.custhelp.com/app/answers/detail/a_id/5755
https://nvidia.custhelp.com/app/answers/detail/a_id/5761
https://nvidia.custhelp.com/app/answers/detail/a_id/5738
2026年1月Oracle製品のクリティカルパッチアップデートに関する注意喚起
https://www.oracle.com/security-alerts/cpujan2026.html
Juniper製品の脆弱性に関する注意喚起
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-SRX-Series-If-a-specific-request-is-processed-by-the-DNS-subsystem-flowd-will-crash-CVE-2026-21920
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-A-specifically-crafted-show-chassis-command-causes-chassisd-to-crash-CVE-2025-60007
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-Receipt-of-a-specifically-malformed-ICMP-packet-causes-an-FPC-restart-CVE-2026-0203
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-Space-Multiple-vulnerabilities-resolved-in-24-1R5-release
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-SRX-and-MX-Series-When-TCP-packets-occur-in-a-specific-sequence-flowd-crashes-CVE-2026-21918
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-MX10k-Series-show-system-firmware-CLI-command-may-lead-to-LC480-or-LC2101-line-card-reset-CVE-2026-21912
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-Evolved-A-Linux-kernel-vulnerability-in-the-HID-driver-allows-an-attacker-to-read-information-from-the-HID-Report-buffer-CVE-2024-50302
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-BGP-update-with-a-set-of-specific-attributes-causes-rpd-crash-CVE-2025-60003
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-SRX-Series-A-specifically-malformed-GTP-message-will-cause-an-FPC-crash-CVE-2026-21914
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Policy-Enforcer-Multiple-vulnerabilities-in-Python-resolved-in-24-1R3-release
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-DHCP-Option-82-messages-from-clients-being-passed-unmodified-to-the-DHCP-server-CVE-2025-59960
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Optional-transitive-BGP-attribute-is-modified-before-propagation-to-peers-causing-sessions-to-flap-CVE-2025-60011
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-SRX-Series-Specifically-malformed-SSL-packet-causes-FPC-crash-CVE-2026-21917
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-SRX-Series-MX-Series-with-MX-SPC3-or-MS-MPC-Receipt-of-multiple-specific-SIP-messages-results-in-flow-management-process-crash-CVE-2026-21905
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-Evolved-Flapping-management-interface-causes-MAC-learning-on-label-switched-interfaces-to-stop-CVE-2026-21911
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-EX4k-Series-QFX5k-Series-In-an-EVPN-VXLAN-configuration-link-flaps-cause-Inter-VNI-traffic-drop-CVE-2026-21910
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-Space-TLS-SSL-server-supports-use-of-static-key-ciphers-ssl-static-key-ciphers-CVE-2026-21907
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Paragon-Automation-A-clickjacking-vulnerability-in-the-web-server-configuration-has-been-addressed-CVE-2025-52987
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-Subscribing-to-telemetry-sensors-at-scale-causes-all-FPCs-to-crash-CVE-2026-21903
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-EX4000-A-high-volume-of-traffic-destinated-to-the-device-leads-to-a-crash-and-restart-CVE-2026-21913
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Receipt-of-specific-IS-IS-update-packet-causes-memory-leak-leading-to-RPD-crash-CVE-2026-21909
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-When-telemetry-collectors-are-frequently-subscribing-and-unsubscribing-to-sensors-chassisd-or-rpd-will-crash-CVE-2026-21921
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Unix-socket-used-to-control-the-jdhcpd-process-is-world-writable-CVE-2025-59961
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Executing-a-specific-show-command-leads-to-an-rpd-crash-CVE-2025-59959
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-and-Junos-OS-Evolved-Use-after-free-vulnerability-In-802-1X-authentication-daemon-can-cause-crash-of-the-dot1xd-process-CVE-2026-21908
https://supportportal.juniper.net/s/article/2026-01-Security-Bulletin-Junos-OS-SRX-Series-With-GRE-performance-acceleration-enabled-receipt-of-a-specific-ICMP-packet-causes-the-PFE-to-crash-CVE-2026-21906
https://supportportal.juniper.net/s/article/2025-10-Security-Bulletin-Junos-OS-SRX-Series-and-MX-Series-Receipt-of-specific-SIP-packets-in-a-high-utilization-situation-causes-a-flowd-crash-CVE-2025-52960
Cisco製品の脆弱性に関する注意喚起
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-9TDh2kx
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xss-964cdxW5
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-epnm-pi-stored-xss-GEkX8yWK
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snort3-dcerpc-vulns-J9HNF4tH
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ise-xxe-jWSbSDKt
キヤノン製複合機、レーザービームプリンターの脆弱性に関する注意喚起
https://jvn.jp/vu/JVNVU99107852/
Palo Alto Networks製品の脆弱性に関する注意喚起
https://security.paloaltonetworks.com/PAN-SA-2026-0001
https://security.paloaltonetworks.com/CVE-2026-0227
IBM製品の脆弱性に関する注意喚起
https://www.ibm.com/support/pages/node/7256876
https://www.ibm.com/support/pages/node/7256788
https://www.ibm.com/support/pages/node/7256861
https://www.ibm.com/support/pages/node/7256790
https://www.ibm.com/support/pages/bulletin/
Dell Technologies製品の脆弱性に関する注意喚起
https://www.dell.com/support/kbdoc/ja-jp/000412391/dell-proactive-messaging-regarding-upcoming-microsoft-secure-boot-certificate-expiration
https://www.dell.com/support/kbdoc/ja-jp/000412375/dsa-2026-028-security-update-for-dell-vxrail-for-multiple-third-party-component-vulnerabilities
https://www.dell.com/support/kbdoc/ja-jp/000412345/dsa-2025-422-security-update-for-dell-client-platform-for-an-insyde-bios-vulnerability
https://www.dell.com/support/kbdoc/ja-jp/000412340/dsa-2026-039-dell-powerstore-t-security-update-for-multiple-vulnerabilities
Fortinet製品の脆弱性に関する注意喚起
https://www.fortiguard.com/psirt/FG-IR-25-778
https://www.fortiguard.com/psirt/FG-IR-25-735
https://www.fortiguard.com/psirt/FG-IR-25-084
https://www.fortiguard.com/psirt/FG-IR-25-783
https://www.fortiguard.com/psirt/FG-IR-25-260
https://www.fortiguard.com/psirt/FG-IR-25-772
https://www.fortiguard.com/psirt?filter=1&version=
HPE製品の脆弱性に関する注意喚起
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbgn04985en_us&docLocale=en_US
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04993en_us&docLocale=en_US
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04992en_us&docLocale=en_US
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04994en_us&docLocale=en_US
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04987en_us&docLocale=en_US
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesbnw04988en_us&docLocale=en_US
https://support.hpe.com/hpesc/public/docDisplay?docId=hpesb3p04984en_us&docLocale=en_US
SAP製品の脆弱性に関する注意喚起
https://support.sap.com/en/my-support/knowledge-base/security-notes-news/january-2026.html
Apache Strutsの脆弱性に関する注意喚起
https://jvn.jp/vu/JVNVU91185180/
https://cwiki.apache.org/confluence/display/WW/S2-069
トレンドマイクロ製Apex Centralの脆弱性に関する注意喚起
https://success.trendmicro.com/ja-JP/solution/KA-0022081
GitLabの脆弱性に関する注意喚起
https://about.gitlab.com/releases/2026/01/07/patch-release-gitlab-18-7-1-released/