• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
Cisco Patches ‘high Severity’ Bugs Impacting Switches, Fibre Storage

Cisco Patches ‘High-Severity’ Bugs Impacting Switches, Fibre Storage

You are here: Home / Cloud Security News / Cisco Patches ‘High-Severity’ Bugs Impacting Switches, Fibre Storage
August 26, 2020

Nine bugs were being patched, eight of which are rated ‘high’ severity.

Cisco Units disclosed eight significant-severity bugs impacting a variety of its networking gear, which include its switches and fiber storage remedies. Cisco’s NX-OS was hardest hit, with 6 security alerts tied to the network running technique that underpins the networking giant’s Nexus-collection Ethernet switches and MDS-collection Fibre Channel storage place network switches.

Patches are out there for all vulnerabilities, according to a Cisco Security Advisory posted on Wednesday. In addition to the eight patched significant-severity bugs, Cisco also mounted a flaw (CVE-2020-3504) mentioned as medium severity that  impacts the Cisco Unified Computing System administration software program.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Substantial-severity vulnerabilities impacting Cisco’s NX-OS program contain CVEs tracked as CVE-2020-3397, CVE-2020-3398, CVE-2020-3338, CVE-2020-3415, CVE-2020-3517 and CVE-2020-3454.Two bugs (CVE-2020-3397 and CVE-2020-3398) are “Cisco NX-OS application Border Gateway Protocol Multicast VPN denial of services vulnerabilities,” in accordance to the security bulletin. Both of those vulnerabilities allow for an attacker to start possibly a partial or prolonged DoS attack through session resets and system reloading.

“The vulnerability is because of to incomplete enter validation of a particular sort of BGP MVPN update information. An attacker could exploit this vulnerability by sending this precise, valid BGP MVPN update message to a focused system,” wrote Cisco pertaining to CVE-2020-3397. The other VPN bug is due to incorrect parsing of a specific form of BGP MVPN update message.

Cisco also noted a bug (CVE-2020-3338) in the context of its NX-OS software program underlying its IPv6 Protocol Unbiased Multicast (PIM). “PIMs are applied between switches so that they can track which multicast packets to ahead to every other and to their straight related LANs,” in accordance to Cisco.

The vulnerability makes it possible for an unauthenticated, distant attacker to trigger a denial-of-company (DoS) problem on an impacted device, Cisco claimed. Vulnerable are Nexus 3000 Collection Switches (CSCvr91853), Nexus 7000 Series Switches (CSCvr97684) and Nexus 9000 Series Switches in standalone NX-OS manner (CSCvr91853).

1 of the additional appealing of the patched bugs is the NX-OS computer software Contact House command injection bug could permit an authenticated, remote attacker to inject arbitrary instructions that could be executed with root privileges on the fundamental functioning method.

“The vulnerability is due to inadequate input validation of certain Simply call Dwelling configuration parameters when the application is configured for transportation process HTTP. An attacker could exploit this vulnerability by modifying parameters inside the Connect with Residence configuration on an affected system,” Cisco warned.

Impacted are 9 Cisco switches ranging from MDS 9000 Sequence Multilayer Switches to the Nexus 9500 R-Series Switching Platform.

On Wed Sept. 16 @ 2 PM ET: Find out the tricks to managing a productive Bug Bounty Method. Resister nowadays for this FREE Threatpost webinar “Five Necessities for Functioning a Profitable Bug Bounty Program“. Hear from top rated Bug Bounty Method specialists how to juggle general public as opposed to personal plans and how to navigate the challenging terrain of handling Bug Hunters, disclosure insurance policies and budgets. Join us Wednesday Sept. 16, 2-3 PM ET for this Dwell webinar.



Previous Post: «Cyber Security News US Arrests Vacationer In excess of Malware Conspiracy
Next Post: Estonia ambassador to link dots from cyberwar to security lifestyle Estonia Ambassador To Link Dots From Cyberwar To Security Lifestyle»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • Nation-State Hackers Deploy New Airstalk Malware in Suspected Supply Chain Attack
  • China-Linked Hackers Exploit Windows Shortcut Flaw to Target European Diplomats
  • China-Linked Tick Group Exploits Lanscope Zero-Day to Hijack Corporate Systems
  • The MSP Cybersecurity Readiness Guide: Turning Security into Growth
  • CISA and NSA Issue Urgent Guidance to Secure WSUS and Microsoft Exchange Servers
  • Eclipse Foundation Revokes Leaked Open VSX Tokens Following Wiz Discovery
  • CISA Flags VMware Zero-Day Exploited by China-Linked Hackers in Active Attacks
  • A New Security Layer for macOS Takes Aim at Admin Errors Before Hackers Do
  • Google’s Built-In AI Defenses on Android Now Block 10 Billion Scam Messages a Month
  • Russian Ransomware Gangs Weaponize Open-Source AdaptixC2 for Advanced Attacks

Copyright © TheCyberSecurity.News, All Rights Reserved.