Cisco Patches Multiple NX-OS Software Vulnerabilities

Share This Post

Cisco on Wednesday announced patches for multiple NX-OS software vulnerabilities as part of its semiannual FXOS and NX-OS security advisory bundled publication.

The most severe of the bugs is CVE-2024-20446, a high-severity flaw in the DHCPv6 relay agent of NX-OS that could be exploited by remote, unauthenticated attackers to cause a denial-of-service (DoS) condition.

Improper handling of specific fields in DHCPv6 messages allows attackers to send crafted packets to any IPv6 address configured on a vulnerable device.

“A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition,” Cisco explains.

According to the tech giant, only Nexus 3000, 7000, and 9000 series switches in standalone NX-OS mode are affected, if they run a vulnerable NX-OS release, if the DHCPv6 relay agent is enabled, and if they have at least one IPv6 address configured.

The NX-OS patches resolve a medium-severity command injection defect in the CLI of the platform, and two medium-risk flaws that could allow authenticated, local attackers to execute code with root privileges or escalate their privileges to network-admin level.

Additionally, the updates resolve three medium-severity sandbox escape issues in the Python interpreter of NX-OS, which could lead to unauthorized access to the underlying operating system.

On Wednesday, Cisco also released fixes for two medium-severity bugs in the Application Policy Infrastructure Controller (APIC). One could allow attackers to modify the behavior of default system policies, while the second – which also affects Cloud Network Controller – could lead to escalation of privileges.

Advertisement. Scroll to continue reading.

Cisco says it is not aware of any of these vulnerabilities being exploited in the wild. Additional information can be found on the company’s security advisories page and in the August 28 semiannual bundled publication.

Related: Cisco Patches High-Severity Vulnerability Reported by NSA

Related: Atlassian Patches Vulnerabilities in Bamboo, Confluence, Crowd, Jira

Related: BIND Updates Resolve High-Severity DoS Vulnerabilities

Related: Johnson Controls Patches Critical Vulnerability in Industrial Refrigeration Products

This post was originally published on this site

More Articles

Article

Navigating SEC Regulations In Cybersecurity And Incident Response

Free video resource for cybersecurity professionals. As 2024 approaches, we all know how vital it is to keep up to date with regulatory changes that affect our work. We get it – it’s a lot to juggle, especially when you’re in the trenches working on an investigation, handling, and responding to incidents.