Source: www.securityweek.com – Author: Ionut Arghire
Cisco on Wednesday announced patches for a vulnerability in the NX-OS software’s bootloader that could allow attackers to bypass image signature verification.
Tracked as CVE-2024-20397, the high-impact security defect exists due to insecure bootloader settings that enable an attacker to execute specific commands to bypass the verification process and load unverified software.
While authentication is not required for the successful exploitation of the flaw, physical access is, Cisco notes in its advisory. The bug can also be exploited by an authenticated, local attacker that has administrative privileges.
According to Cisco, the issue is only relevant for its MDS, Nexus, and UCS Fabric Interconnect products that support secure boot, and not for legacy devices without the feature. In total, the company’s advisory lists more than 100 device models that are impacted.
The tech giant says that this vulnerability affects all MDS 9000 series multilayer switches, Nexus 3000 and 7000 series switches, Nexus 9000 series fabric switches in ACI mode, Nexus 9000 series switches in standalone NX-OS mode, and UCS 6400 and 6500 series fabric interconnects.
Cisco notes that there are no workarounds available for this security defect. However, the company has released several NX-OS software updates to patch the flaw across the affected product series and plans to roll out updates for all devices by the end of this month.
The only devices that will not receive a patch are the Nexus 92160YC-X (N9K-C92160YC-X) switches, which have been discontinued, Cisco notes in its advisory.
The tech giant says it is not aware of the vulnerability being exploited in the wild. Although CVE-2024-20397 is considered a medium-severity issue, users should update their devices as soon as possible, as attackers are known to have exploited medium vulnerabilities in Cisco products for which patches have been released.
Advertisement. Scroll to continue reading.
Related: Cisco Warns of Attacks Exploiting Decade-Old ASA Vulnerability
Related: Vulnerability Exposes MicroLogix PLCs to Remote DoS Attacks
Related: Cisco Removes Default Password From Video Surveillance Manager
Related: Weidmueller Patches Dozen Vulnerabilities in Industrial WLAN Devices
Original Post URL: https://www.securityweek.com/bootloader-vulnerability-impacts-over-100-cisco-switches/
Category & Tags: Vulnerabilities,Cisco – Vulnerabilities,Cisco
Views: 2