Security Experts:

Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Network Security

Cisco Patches Critical Vulnerability in Data Center Switches

Cisco has released patches for tens of vulnerabilities in its products, including a Critical flaw impacting Nexus 9000 switches.

Tracked as CVE-2019-1804 and featuring a CVSS score of 9.8, the issue was found in the SSH key management for the Cisco Nexus 9000 Series Application Centric Infrastructure Mode Switch Software.

Cisco has released patches for tens of vulnerabilities in its products, including a Critical flaw impacting Nexus 9000 switches.

Tracked as CVE-2019-1804 and featuring a CVSS score of 9.8, the issue was found in the SSH key management for the Cisco Nexus 9000 Series Application Centric Infrastructure Mode Switch Software.

The presence of a default SSH key pair in all devices could be exploited by an attacker by opening an SSH connection via IPv6 to a targeted device. The attacker would have access to the system with the privileges of the root user.

CVE-2019-1804 affects Cisco 9000 Series network switchesOnly Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode running a Cisco NX-OS Software release prior to 14.1(1i) are vulnerable, the company says

Cisco released a software update to address the issue and says that it is not aware of a workaround to mitigate the vulnerability. The company also says it is not aware of public exploitation of the vulnerability.

This week, Cisco also released patches for over 20 High severity vulnerabilities impacting the Web Security Appliance (WSA), Umbrella Dashboard, Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD) software, RV320 and RV325 routers, IP Phone 7800 and 8800 Series, Application Policy Infrastructure Controller (APIC) software, and the Nexus 9000 switches. 

Exploitation of these vulnerabilities could allow attackers to escalate privileges, cause denial of service on the affected devices, hijack sessions, maintain access to a dashboard, bypass certificate authentication, establish a VPN session, or discover the private keys of an affected device. 

Additionally, over a dozen Medium risk flaws addressed this week could be exploited for cross-site scripting (XSS) and cross-site request forgery (CSRF) attacks, command injection, directory traversal, filtering functionality bypass, denial of service, or to access sensitive information. 

Additional information on these vulnerabilities and on the patches Cisco has released for them can be found on the company’s support website. 

Related: Cisco Patches Critical Flaw in ASR 9000 Routers

Related: Default Account in Cisco CSPC Allows Unauthorized Access

Related: Cisco Patches Critical Vulnerability in Wireless Routers

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Click to comment

Expert Insights

Related Content

Network Security

NSA publishes guidance to help system administrators identify and mitigate cyber risks associated with transitioning to IPv6.

Mobile & Wireless

Technical details published for an Arm Mali GPU flaw leading to arbitrary kernel code execution and root on Pixel 6.

Mobile & Wireless

Apple rolled out iOS 16.3 and macOS Ventura 13.2 to cover serious security vulnerabilities.

Cloud Security

VMware vRealize Log Insight vulnerability allows an unauthenticated attacker to take full control of a target system.

Mobile & Wireless

Apple’s iOS 12.5.7 update patches CVE-2022-42856, an actively exploited vulnerability, in old iPhones and iPads.

Vulnerabilities

Security researchers have observed an uptick in attacks targeting CVE-2021-35394, an RCE vulnerability in Realtek Jungle SDK.

Mobile & Wireless

Two vulnerabilities in Samsung’s Galaxy Store that could be exploited to install applications or execute JavaScript code by launching a web page.

Vulnerabilities

Several vulnerabilities have been patched in OpenText’s enterprise content management (ECM) product.