Cisco this week released patches for ten high-risk vulnerabilities in NX-OS software, including some that could lead to code execution and privilege escalation.
Tracked as CVE-2020-3517, the first of the flaws resides in the Fabric Services component and could lead to a denial of service (DoS) condition in both FXOS and NX-OS software. The issue exists due to insufficient error handling when parsing Fabric Services messages.
The second issue (CVE-2020-3415) is a remote code execution (RCE) flaw in the Data Management Engine (DME) of NX-OS software, which could be exploited by sending a crafted Discovery Protocol packet to a Layer 2-adjacent affected device.
An elevation of privilege flaw (CVE-2020-3394) in the Enable Secret feature could be abused to get full administrative privileges on Nexus 3000 and 9000 series switches. The same devices are affected by a DoS flaw (CVE-2020-3397) in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation. Another DoS issue (CVE-2020-3398) in BGP MVPN affects Nexus 7000 series switches too.
Cisco also addressed CVE-2020-3454, a bug in the Call Home feature of NX-OS that could result in commands being executed as root, CVE-2020-3338, a DoS issue in the Protocol Independent Multicast (PIM) feature for IPv6 networks (PIM6), and CVE-2019-1896, a command injection vulnerability in the web-based management interface of Cisco Integrated Management Controller (IMC).
The company also released updates for advisories addressing two command injection vulnerabilities (CVE-2018-0307 and CVE-2018-0306) in the CLI of NX-OS, which were initially patched in June 2018. The flaws could allow an attacker to inject malicious arguments into a vulnerable CLI command.
NX-OS software updates were released to fix all of these issues. The company says it is not aware of “public announcements or malicious use” of these bugs. Detailed information on all of the issues is available on Cisco’s security advisories page.
In addition to these NX-OS-related flaws, Cisco this week patched a medium severity DoS vulnerability (CVE-2020-3504) in the local management (local-mgmt) CLI of Cisco UCS Manager Software.
The company also released an update for the advisory addressing a high risk directory traversal flaw in the web services interface of Adaptive Security Appliance (ASA) and Firepower Threat Defense (FTD), which was disclosed last month and stated being exploited shortly after.
Related: Vulnerability in Cisco Firewalls Exploited Shortly After Disclosure
Related: Default Credentials Expose Cisco ENCS, CSP Appliances to Attacks
Related: Cisco Patches High Severity Vulnerabilities in Security Products

More from Ionut Arghire
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Florida Hospital Cancels Procedures, Diverts Patients Following Cyberattack
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
Latest News
- Comcast Wants a Slice of the Enterprise Cybersecurity Business
- Critical Baicells Device Vulnerability Can Expose Telecoms Networks to Snooping
- New York Attorney General Fines Vendor for Illegally Promoting Spyware
- SecurityWeek Analysis: Over 450 Cybersecurity M&A Deals Announced in 2022
- 20 Million Users Impacted by Data Breach at Instant Checkmate, TruthFinder
- Cyber Insights 2023 | Zero Trust and Identity and Access Management
- Cyber Insights 2023 | The Coming of Web3
- European Police Arrest 42 After Cracking Covert App
