Security updates: DoS attacks on Cisco firewalls and switches possible

Network admins should update their Cisco devices for security reasons. The developers have closed several security holes in various products.

Advertisement

Admins can find the affected devices and the software protected against possible attacks in the warning messages linked below this article. The DoS vulnerabilities affect certain models of the Firepower and Nexus series. In addition, some products with the network operating system NX-OS are vulnerable.

Because processing errors occur with specific Simple Network Management Protocol (SNMP) requests (CVE-2023-20200 “high“), authenticated attackers can remotely trigger a reboot of devices. This affects the Firepower 4100 and 9300 Security Appliance series of firewalls. UCS 6300 Series Fabric Interconnects are also at risk.

On Nexus 3000 and 9000 series switches, attackers can exploit a vulnerability (CVE-2023-20169 “high“) in the intermediate system-to-intermediate system protocol (IS-IS). A DoS state is also possible here. This should be possible by sending prepared IS-IS packages.

The third with the threat level “high” classified vulnerability (CVE-2023-20168) affects NX-OS. The DoS vulnerability endangers switches of the Nexus series, among others.

Advertisement

The remaining vulnerabilities are marked with “medium” and affect, among other things, application policy infrastructure controllers. At this point, an attacker can access areas that are actually isolated. To do this, however, he must be authenticated.

List sorted by threat level in descending order:


(of)

To home page

source site