Wednesday, August 17, 2022
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > Cisco patches four flaws

Cisco patches four flaws

Cisco announced that the updates that address critical security vulnerabilities affecting the company's software are now released.


Erdem Yasar Erdem Yasar
February 25, 2022
4 min read
Cisco patches four flaws

Cisco released several patches that address security vulnerabilities found in the company’s software. The most critical vulnerability, CVE-2022-20650 has a CVSS score of 8.8. It allows command injection in the NX-API feature of Cisco NX-OS Software, caused by the insufficient input validation of user-supplied data. It allows a third party to execute arbitrary commands with root privileges. Vulnerable products are:

  • Nexus 3000 Series Switches 
  • Nexus 5500 Platform Switches 
  • Nexus 5600 Platform Switches 
  • Nexus 6000 Series Switches 
  • Nexus 9000 Series Switches in standalone NX-OS mode 

No workarounds

Cisco also released three more updates. These updates are addressing vulnerabilities tracked as CVE-2022-20625, CVE-2022-20624, and CVE-2022-20623, which have a CVSS score of 4.3, 8.6, and 8,6 respectively. Only CVE-2022-20625 has a known workaround.

CVE-2022-20625 was found in the Cisco Discovery Protocol service of Cisco FXOS Software and Cisco NX-OS Software. It allows an unauthorized and adjacent attacker to cause the service to restart which causes a denial of service condition. It is caused by the improper handling of Cisco Discovery Protocol messages that are processed by the Cisco Discovery Protocol service, which can be exploited by sending a series of malicious Cisco Discovery Protocol messages. Vulnerable products are:

  • Firepower 4100 Series 
  • Firepower 9300 Security Appliances 
  • MDS 9000 Series Multilayer Switches 
  • Nexus 1000 Virtual Edge for VMware vSphere 
  • Nexus 1000V Switch for Microsoft Hyper-V 
  • Nexus 1000V Switch for VMware vSphere 
  • Nexus 3000 Series Switches 
  • Nexus 5500 Platform Switches 
  • Nexus 5600 Platform Switches 
  • Nexus 6000 Series Switches 
  • Nexus 7000 Series Switches 
  • Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode 
  • Nexus 9000 Series Switches in standalone NX-OS mode 
  • UCS 6200 Series Fabric Interconnects
  • UCS 6300 Series Fabric Interconnects
  • UCS 6400 Series Fabric Interconnects

CVE-2022-20624 is found in the Cisco Fabric Services over IP feature of Cisco NX-OS Software. It allows third parties to cause a denial of service. The flaw was caused by insufficient validation of incoming CFSoIP packets. The vulnerability can be exploited by sending crafted CFSoIP packets. Vulnerable products are:

  • Nexus 3000 Series Switches 
  • Nexus 9000 Series Switches in standalone NX-OS mode 
  • UCS 6400 Series Fabric Interconnects

CVE-2022-20623 is a vulnerability located in the rate limiter for Bidirectional Forwarding Detection (BFD) traffic of Cisco NX-OS Software for Cisco Nexus 9000 Series Switches. It allows third parties to cause BFD traffic to be dropped. The flaw is caused by a logic error in the BFD rate limiter functionality. It can be exploited by sending a crafted stream of traffic through the device. Vulnerable products are:

  • The device is running a vulnerable version of Cisco NX-OS Software.
  • The device has the BFD feature enabled (BFD is disabled by default).
  • The device has a Cisco Cloud Scale ASIC installed.
  • N9K-C92160YC-X
  • N9K-C92300YC
  • N9K-C92304QC
  • N9K-C9232C
  • N9K-C92348GC-X
  • N9K-C9236C
  • N9K-C9272Q
  • N9K-C93108TC-EX
  • N9K-C93108TC-FX
  • N9K-C9316D-GX
  • N9K-C93180LC-EX
  • N9K-C93180YC2-FX
  • N9K-C93180YC-EX
  • N9K-C93180YC-FX
  • N9K-C93216TC-FX2
  • N9K-C93240YC-FX2
  • N9K-C9332C
  • N9K-C93360YC-FX2
  • N9K-C9336C-FX2
  • N9K-C9348GC-FXP
  • N9K-C93600CD-GX
  • N9K-C9364C
  • N9K-C9364C-GX
  • N9K-X97160YC-EX
  • N9K-X97284YC-FX
  • N9K-X9732C-EX
  • N9K-X9732C-FX
  • N9K-X9736C-EX
  • N9K-X9736C-FX
  • N9K-X9788TC-FX

Cisco urged users to apply the updates as soon as possible.

See more Cybersecurity News


Tags: Cisco Systems

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Intel has a couple of big news to share

Intel has a couple of big news to share

Related News

Critical Realtek vulnerability leaves networking devices at risk

Critical Realtek vulnerability leaves networking devices at risk

August 17, 2022 7:15 pm
Trend Micro warned about incomplete or faulty patches

Trend Micro warned about incomplete or faulty patches

August 17, 2022 7:00 pm
1,900 Signal users' phone numbers may be exposed

1,900 Signal users’ phone numbers may be exposed

August 16, 2022 10:05 pm
10 malicious packages found on PyPI

10 malicious packages found on PyPI

August 16, 2022 9:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the Cloud7 Newsletter

Sign up for the Cloud7 Newsletter to receive the latest IT business updates straight to your inbox daily.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

Interview with Igor Seletskiy on AlmaLinux

7 best hosting control panels

How to update Linux Kernel without rebooting?

7 best Linux mail servers for 2022

7 best cPanel alternatives for 2022

7 best Linux web browsers for 2022

7 best CentOS alternatives

7 best Linux server distros for 2022

How to scan your server for Log4j (Log4Shell) vulnerability

10 Best Web Hosting Services of 2022

AlmaLinux 8.6 Stable is ready to download

Ubuntu 22.04 LTS is available for download. What is new?

Kali Linux 2022.2 is ready for download

Recent News

  • Deepin 23 Preview is released with atomic updates
  • Critical Realtek vulnerability leaves networking devices at risk
  • Trend Micro warned about incomplete or faulty patches
  • Proton 7.0-4 comes with support for more games
  • Cloud7 Podcast – Episode 10: Software-Defined Storage


Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2022, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2022, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.