Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Cisco Patches Critical Flaws in NX-OS Software

Cisco on Wednesday released patches for more than 30 security vulnerabilities in its products, including Critical flaws impacting NX-OS Software.

Cisco on Wednesday released patches for more than 30 security vulnerabilities in its products, including Critical flaws impacting NX-OS Software.

A total of five Critical arbitrary code execution vulnerabilities were addressed with this set of security patches, impacting the NX-API feature of NX-OS Software (CVE-2018-0301) and the Fabric Services component of FXOS Software and NX-OS Software (CVE-2018-0308, CVE-2018-0304, CVE-2018-0314, and CVE-2018-0312).

The bugs can be exploited by unauthenticated, remote attackers to cause a buffer overflow, execute arbitrary code (as root, in some cases), cause a denial of service (DoS) condition, or read sensitive memory content on an affected device.

The bugs impact multiple devices, including Nexus 3000 Series Switches to Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Firepower 4100 and Firepower 9300 products, UCS 6100 to UCS 6300 Series Fabric Interconnects, and MDS 9000 Series Multilayer Switches.

Cisco also addressed High risk vulnerabilities impacting NX-OS Software and FXOS Software, affecting Nexus 4000 Series Switch, Nexus 3000 and 9000 Series, and Firepower 4100 Series and Firepower 9300 Security Appliance.

The issues affecting NX-OS include command-injections in the CLI and NX-API, denial of service (DoS) in the Simple Network Management Protocol (SNMP) input packet processor, elevation of privilege in role-based access control (RBAC), remote code execution and DoS in the Internet Group Management Protocol (IGMP) Snooping feature, DoS in the Border Gateway Protocol (BGP) implementation, elevation of privilege in NX-API.

Flaws also affecting FXOS Software include unauthorized administrator account in the write-erase feature, DoS conditions in the Discovery Protocol (formerly known as CDP) subsystem and Cisco Fabric Services component, and arbitrary code execution in the Cisco Discovery Protocol component.

Issues affecting only FXOS Software include an arbitrary code execution vulnerability in the CLI parser and a denial of service bug in the web UI.

Advertisement. Scroll to continue reading.

Additionally, Cisco patched DoS flaws in the SNMP feature of the Cisco Nexus 4000 Series Switch and in the implementation of a specific CLI command and the associated SNMP MIB for Cisco Nexus 3000 and 9000 Series Switches.

A path traversal vulnerability was resolved in the process of uploading new application images to the Cisco Firepower 4100 Series Next-Generation Firewall (NGFW) and Firepower 9300 Security Appliance.

As part of this set of security updates, Cisco also addressed 10 Medium risk flaws in TelePresence Video Communication Server (VCS) Expressway, Unified Communications Manager IM & Presence Service (formerly CUPS), NX-OS Software, NVIDIA TX1 BootROM, Meeting Server, Firepower Management Center, 5000 Series Enterprise Network Compute System and Unified Computing (UCS) E-Series Servers, and AnyConnect Secure Mobility Client for Windows Desktop.

Software updates were released for the vulnerable products. Cisco customers with valid licenses are advised to upgrade to an appropriate release. Details on the resolved vulnerabilities and the affected products and devices are available on Cisco’s website.

Related: Critical Flaws in Cisco DNA Center Allow Unauthorized Access

Related: Cisco Patches Critical Flaws in WebEx, UCS Director

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Professional services company Slalom has appointed Christopher Burger as its first CISO.

Allied Universal announced that Deanna Steele has joined the company as CIO for North America.

Former DoD CISO Jack Wilmer has been named CEO of defensive and offensive cyber solutions provider SIXGEN.

More People On The Move

Expert Insights

Related Content

Vulnerabilities

Less than a week after announcing that it would suspended service indefinitely due to a conflict with an (at the time) unnamed security researcher...

Identity & Access

Zero trust is not a replacement for identity and access management (IAM), but is the extension of IAM principles from people to everyone and...

Data Breaches

OpenAI has confirmed a ChatGPT data breach on the same day a security firm reported seeing the use of a component affected by an...

IoT Security

A group of seven security researchers have discovered numerous vulnerabilities in vehicles from 16 car makers, including bugs that allowed them to control car...

Vulnerabilities

A researcher at IOActive discovered that home security systems from SimpliSafe are plagued by a vulnerability that allows tech savvy burglars to remotely disable...

Risk Management

The supply chain threat is directly linked to attack surface management, but the supply chain must be known and understood before it can be...

Cybercrime

Patch Tuesday: Microsoft calls attention to a series of zero-day remote code execution attacks hitting its Office productivity suite.

Vulnerabilities

Patch Tuesday: Microsoft warns vulnerability (CVE-2023-23397) could lead to exploitation before an email is viewed in the Preview Pane.