Network admins should update their Cisco devices for security reasons. The developers have closed several security holes in various products.
Advertisement
Admins can find the affected devices and the software protected against possible attacks in the warning messages linked below this article. The DoS vulnerabilities affect certain models of the Firepower and Nexus series. In addition, some products with the network operating system NX-OS are vulnerable.
Dangerous DoS vulnerabilities
Because processing errors occur with specific Simple Network Management Protocol (SNMP) requests (CVE-2023-20200 “high”), authenticated attackers can remotely trigger a restart of devices. This affects the Firepower 4100 and 9300 Security Appliance firewall series. UCS 6300 Series Fabric Interconnects are also under threat.
On Nexus switches of the 3000 and 9000 series, attackers can target a vulnerability (CVE-2023-20169 “high”) in the intermediate system-to-intermediate system protocol (IS-IS) without authentication. A DoS condition is also possible here. This should be possible by sending prepared IS-IS packages.
The third vulnerability classified as high threat (CVE-2023-20168) affects NX-OS. The DoS vulnerability endangers switches of the Nexus series, among others.
Other vulnerabilities
Advertisement
The remaining vulnerabilities are classified as “medium” and affect Application Policy Infrastructure Controller, among others. At this point, an attacker can access areas that are actually isolated. But he has to be authenticated for that.
List sorted by threat level in descending order:
(of the)
Zur Startseite
#Security #updates #DoS #attacks #Cisco #firewalls #switches