Cisco Nexus Vulnerability Let Attackers Launch Command Injection Attack


Cisco has issued a security advisory regarding a critical vulnerability in its Nexus Dashboard Fabric Controller (NDFC). This flaw could allow an authenticated, low-privileged, remote attacker to perform a command injection attack on affected devices.

The vulnerability arises from improper user authorization and insufficient validation of command arguments.

EHA

Details of the Vulnerability

The vulnerability can be exploited by submitting crafted commands through an affected REST API endpoint or via the web UI. If successfully exploited, the attacker could execute arbitrary commands on the command-line interface (CLI) of a Cisco NDFC-managed device with network-admin privileges.

Notably, this vulnerability does not affect Cisco NDFC when configured for storage area network (SAN) controller deployment.

Analyse Any Suspicious Links Using ANY.RUN’s New Safe Browsing Tool: Try for Free

Affected Products

  • Vulnerable: Cisco Nexus Dashboard Fabric Controller
  • Not Affected: Cisco NDFC configured for SAN controller deployment, Nexus Dashboard Insights, Nexus Dashboard Orchestrator (NDO)

Cisco has released free software updates to address this vulnerability. Customers with service contracts are advised to obtain these updates through their usual channels. There are no workarounds available for this vulnerability.

Fixed Software Releases:

  • Cisco NDFC Release 11.5 and earlier: Not vulnerable
  • Cisco NDFC Release 12.0: Fixed in Release 12.2.2
  • Cisco Nexus Dashboard Release 3.2(1e): Includes Cisco NDFC Release 12.2.2

Customers are encouraged to upgrade to these fixed releases to mitigate potential risks.

Customers without service contracts who purchased directly from Cisco or through third-party vendors should contact the Cisco Technical Assistance Center (TAC) for assistance in obtaining the necessary software upgrades.

As of now, there have been no public announcements or known malicious exploits of this vulnerability. Cisco’s Product Security Incident Response Team (PSIRT) continues to monitor the situation closely.

Stay informed and ensure your systems are secure by regularly consulting Cisco’s security advisories and applying necessary updates promptly.

Free Webinar on How to Protect Small Businesses Against Advanced Cyberthreats -> Free Registration



Source link