Security

Cisco Patches Several NX-OS Software Application Vulnerabilities

.Cisco on Wednesday revealed patches for several NX-OS software susceptabilities as part of its biannual FXOS and NX-OS safety consultatory bundled magazine.The most severe of the bugs is actually CVE-2024-20446, a high-severity defect in the DHCPv6 relay solution of NX-OS that can be capitalized on by remote, unauthenticated opponents to create a denial-of-service (DoS) ailment.Incorrect handling of particular areas in DHCPv6 notifications allows aggressors to deliver crafted packets to any IPv6 address configured on a vulnerable device." A prosperous make use of could make it possible for the opponent to trigger the dhcp_snoop method to break up and restart several times, leading to the influenced device to refill and also resulting in a DoS ailment," Cisco discusses.Depending on to the technician titan, only Nexus 3000, 7000, and 9000 set switches over in standalone NX-OS setting are influenced, if they operate a vulnerable NX-OS release, if the DHCPv6 relay agent is enabled, and also if they contend minimum one IPv6 handle set up.The NX-OS spots settle a medium-severity demand treatment issue in the CLI of the platform, as well as two medium-risk flaws that could make it possible for verified, neighborhood attackers to implement code with origin benefits or even intensify their privileges to network-admin level.Furthermore, the updates deal with 3 medium-severity sandbox getaway issues in the Python linguist of NX-OS, which can bring about unauthorized access to the underlying system software.On Wednesday, Cisco additionally launched remedies for two medium-severity infections in the Treatment Plan Framework Controller (APIC). One might permit assailants to tweak the behavior of default device policies, while the 2nd-- which also impacts Cloud Network Controller-- might bring about growth of privileges.Advertisement. Scroll to proceed reading.Cisco states it is not familiar with any one of these susceptibilities being capitalized on in bush. Added information may be found on the provider's security advisories webpage as well as in the August 28 semiannual bundled publication.Connected: Cisco Patches High-Severity Susceptibility Stated by NSA.Related: Atlassian Patches Vulnerabilities in Bamboo, Assemblage, Group, Jira.Related: BIND Updates Resolve High-Severity Disk Operating System Vulnerabilities.Related: Johnson Controls Patches Important Weakness in Industrial Refrigeration Products.