Now on Demand: Threat Detection and Incident Response (TDIR) Summit - All Sessions Available
Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

Cisco Patches Critical VM Escape in NFV Infrastructure Software

Cisco on Wednesday announced patches to address severe vulnerabilities in Enterprise Network Function Virtualization Infrastructure Software (NFVIS), including a critical bug that allows attackers to escape from a guest virtual machine (VM).

Cisco on Wednesday announced patches to address severe vulnerabilities in Enterprise Network Function Virtualization Infrastructure Software (NFVIS), including a critical bug that allows attackers to escape from a guest virtual machine (VM).

Tracked as CVE-2022-20777 (CVSS score of 9.9), the critical vulnerability impacts the Next Generation Input/Output (NGIO) feature of Enterprise NFVIS.

According to the tech giant, the issue is related to insufficient guest restrictions. An authenticated attacker could send an API call from a VM and have it executed on the NFVIS host with root-level privileges, leading to full compromise of the host.

Cisco’s advisory also describes two high-severity vulnerabilities in NFVIS, which an attacker could exploit to inject commands or leak system data.

[ READ: Cisco Patches 11 High-Severity Vulnerabilities in Security Products ]

Tracked as CVE-2022-20779 (CVSS score of 8.8), the first of the issues impacts the image registration process of Enterprise NFVIS and it could be exploited remotely, without authentication to inject commands to be executed with root privileges during the VM registration process.

Improper input validation allows an attacker to convince an administrator on the host to install a VM image. Crafted metadata in the image results in commands being executed with root-level privileges on the NFVIS host.

Cisco also patched CVE-2022-20780 (CVSS score of 7.4), a security flaw in the import function of Enterprise NFVIS that could allow a remote, unauthenticated attacker to leak data from the host.

Advertisement. Scroll to continue reading.

“This vulnerability is due to the resolution of external entities in the XML parser. An attacker could exploit this vulnerability by persuading an administrator to import a crafted file that will read data from the host and write it to any configured VM,” Cisco explains.

Cisco has addressed the issues with the release of Enterprise NFVIS 4.7.1. The company says the security defects impact the default configuration of its infrastructure software, encouraging customers to update to a fixed version as soon as possible.

The tech giant is not aware of any of these vulnerabilities being exploited in attacks.

Related: Cisco Patches Virtual Conference Software Vulnerability Reported by NSA

Related: CISA Says Recent Cisco Router Vulnerabilities Exploited in Attacks

Related: Cisco Patches Critical Vulnerabilities in Expressway, TelePresence VCS Products

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.

Register

SecurityWeek’s Ransomware Resilience and Recovery Summit helps businesses to plan, prepare, and recover from a ransomware incident.

Register

People on the Move

Wendy Zheng named as CFO and Joe Diamond as CMO at cyber asset management firm Axonius.

Intelligent document processing company ABBYY has hired Clayton C. Peddy as CISO.

Digital executive protection services provider BlackCloak has appointed Ryan Black as CISO.

More People On The Move

Expert Insights