Cisco Issues Critical Fixes for High-End Nexus Gear

Cisco Critical Fixes
Share It On:

28th August 2021, Kathmandu

Networking giant issues two critical patches and six high-rigor patches.

Cisco Systems relinquished six security patches tied to its high-end 9000 series networking gear ranging in paramountcy from critical, high, and medium rigor.

The most earnest of the bugs patched by Cisco (rated 9.1 out of 10) could sanction a remote and unauthenticated adversary to read or inscribe arbitrary files onto an application protocol interface utilized in Cisco 9000 series switches designed to manage its software-defined networking data center solution.

This critical susceptibility, tracked as CVE-2021-1577, impacts Cisco Application Policy Infrastructure Controller (APIC) and Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC). APIC is the main architectural component of the Cisco Application Centric Infrastructure, which runs on the Cisco Nexus 9000 Series node.

 “This susceptibility is due to incongruous access control. An assailer could exploit this susceptibility by utilizing a concrete API endpoint to upload a file to an affected contrivance,” indited Cisco in its Wednesday security bulletin. Affected products are Cisco APIC and Cisco Cloud APIC.

As with each of the bugs and fine-tunes promulgated Wednesday, Cisco verbally expressed mitigations are available for each of the susceptibilities and it is not vigilant of any publicly kenned exploits for those bugs patched. The relinquishment Wednesday, which included 15 patches in all, was a component of a Cisco “bundled publication” of security fine-tunes for its Firepower Extensible Operating System and is Linux kernel compatible NX-OS software.

A Nexus of Bug Fine-tunes

Cisco additionally addressed two high-rigor Nexus 9000 bugs (CVE-2021-1586, CVE-2021-1523) and three medium-rigor imperfections (CVE-2021-1583, CVE-2021-1584, CVE-2021-1591). The two high-rigor bugs (both with a base CVSS score of 8.6) are denial of accommodation imperfections.

“A susceptibility in the Multi-Pod or Multi-Site network configurations for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could sanction an unauthenticated, remote assailer to unexpectedly restart the contrivance, resulting in a denial of accommodation (DoS) condition,” inscribed Cisco.

A second high-rigor Nexus 9000 series susceptibility is described by Cisco as an imperfection in its Fabric Switches ACI Mode Queue Wedge.

“[The imperfection] could sanction an unauthenticated, remote assailant to cause a queue wedge on a leaf switch, which could result in critical control plane traffic to the contrivance being dropped. This could result in one or more leaf switches being abstracted from the fabric,” Cisco noted.

Cisco notes that mitigation for this bug requires “a manual intervention to power-cycle the contrivance to recover” after patches have been applied. Affected are generation 1 model N9K (Nexus 9000) series fabric switches.

Critical QNX ‘BadAlloc’ Bugs – Nothing to Visually perceive Here

On Wednesday, Cisco relinquished a second critical advisory for its gear tied to a QNX operating system bug, reported on August 17 by BlackBerry. That bug, according to BlackBerry, could sanction threat actors to surmount or launch denial of accommodation attacks on contrivances and critical infrastructure by exploiting what is called BadAlloc bugs. QNX is BlackBerry’s genuine-time OS, utilized in embedded systems such as automobiles, medical contrivances, and handsets.

While Cisco verbally expresses none of its products are impacted by the QNX bug, it has rated the advisory as critical. “Cisco has consummated its investigation into its product line to determine which products may be affected by this susceptibility. No products are kenned to be affected,” it indited.

The Cisco advisory outlines switch and router products that “leverage the affected QNX software”, however “Cisco has corroborated that the susceptibility is not exploitable on these platforms.”

Cisco products running QNX include:

  • Channelized shared port adapters (SPAs) (CSCvz34866)
  • Circuit Emulation over Packet (CEOP) SPAs (CSCvz34865)
  • IOS XR 32-bit Software (CSCvz34871)

Note: IOS XR 64-bit Software does not leverage QNX software.

  • RF Gateway 10 (CSCvz34869)

Share It On:

Recent Posts

NBA and IMF Discuss Financial Sector Trends and Challenges Under ECF Review

NBA and IMF Discuss Financial Sector Trends and Challenges Under

Share It On:9th January 2024, Kathmandu The Nepal Bankers’ Association (NBA) recently held a high-level meeting with the International Monetary

Neta V and X of CG Motors: Strengthening Presence in Thailand and Nepal

Neta V and X of CG Motors: Strengthening Presence in

Share It On:9th January 2024, Kathmandu The Neta brand has established a strong presence in Thailand’s electric vehicle (EV) market.

Ncell Prioritizes Customer Trust: Achieves ISO 27001 & 27701

Ncell Prioritizes Customer Trust: Achieves ISO 27001 & 27701

Share It On:9th January 2024, Kathmandu Ncell, a leading telecom company in Nepal, has achieved the prestigious ISO 27001:2022 (ISMS)

LBEF Intra-College Hackathon Set to Ignite Innovation Among Students

LBEF Intra-College Hackathon Set to Ignite Innovation Among Students

Share It On:9th January 2024, Kathmandu The countdown has officially begun for the much-anticipated LBEF Intra-College Hackathon, an exciting three-day

EHang & Changan Automobile: A Strategic Partnership to Develop Next-Generation Flying Cars

EHang & Changan Automobile: A Strategic Partnership to Develop Next-Generation

Share It On:8th January 2024, Kathmandu EHang Holdings Limited (Nasdaq: EH), the world’s leading Urban Air Mobility (UAM) technology platform

Nepal’s Cybersecurity Crisis: Are We Prepared for the Future?

Nepal’s Cybersecurity Crisis: Are We Prepared for the Future?

Share It On:8th January 2024, Kathmandu Is Nepal ready to combat cyber threats? Explore real incidents, vulnerabilities, and actionable strategies