Action not permitted
Modal body text goes here.
Modal Title
Modal Body
wid-sec-w-2024-3610
Vulnerability from csaf_certbund
Published
2024-12-04 23:00
Modified
2024-12-04 23:00
Summary
Cisco NX-OS: Schwachstelle ermöglicht Umgehen von Sicherheitsvorkehrungen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Cisco NX-OS ist ein Data Center Netzwerk-Betriebssystem für virtualisierte Rechenzentren. NX-OS wurde für Ethernet Switches der Nexus Serie und Fibre Channel Storage Area Network Swiches der MDS Serie entwickelt.
Bei der Cisco Nexus Serie handelt es sich um modulare Switching-Systeme der Data Center-Klasse.
Bei dem Cisco Unified Computing System (UCS) handelt es sich um eine Rechenzentrumsplattform, die Rechenleistung, Netzwerk, Storage-Zugriff und Virtualisierung in einem System zusammenführt.
Die Cisco MDS 9000-Familie stellt Switches für mittelgroße SAN-Umgebungen und Directors für Unternehmens-SANs zur Verfügung.
Angriff
Ein Angreifer mit physischem Zugriff kann eine Schwachstelle in Cisco NX-OS, Cisco Nexus, Cisco Unified Computing System (UCS) und Cisco MDS 9000 ausnutzen, um Sicherheitsvorkehrungen zu umgehen.
Betroffene Betriebssysteme
- CISCO Appliance
{ "document": { "aggregate_severity": { "text": "mittel" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Cisco NX-OS ist ein Data Center Netzwerk-Betriebssystem f\u00fcr virtualisierte Rechenzentren. NX-OS wurde f\u00fcr Ethernet Switches der Nexus Serie und Fibre Channel Storage Area Network Swiches der MDS Serie entwickelt.\r\nBei der Cisco Nexus Serie handelt es sich um modulare Switching-Systeme der Data Center-Klasse.\r\nBei dem Cisco Unified Computing System (UCS) handelt es sich um eine Rechenzentrumsplattform, die Rechenleistung, Netzwerk, Storage-Zugriff und Virtualisierung in einem System zusammenf\u00fchrt.\r\nDie Cisco MDS 9000-Familie stellt Switches f\u00fcr mittelgro\u00dfe SAN-Umgebungen und Directors f\u00fcr Unternehmens-SANs zur Verf\u00fcgung.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein Angreifer mit physischem Zugriff kann eine Schwachstelle in Cisco NX-OS, Cisco Nexus, Cisco Unified Computing System (UCS) und Cisco MDS 9000 ausnutzen, um Sicherheitsvorkehrungen zu umgehen.", "title": "Angriff" }, { "category": "general", "text": "- CISCO Appliance", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2024-3610 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2024/wid-sec-w-2024-3610.json" }, { "category": "self", "summary": "WID-SEC-2024-3610 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2024-3610" }, { "category": "external", "summary": "Cisco Advisory vom 2024-12-04", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-image-sig-bypas-pQDRQvjL" } ], "source_lang": "en-US", "title": "Cisco NX-OS: Schwachstelle erm\u00f6glicht Umgehen von Sicherheitsvorkehrungen", "tracking": { "current_release_date": "2024-12-04T23:00:00.000+00:00", "generator": { "date": "2024-12-05T11:11:03.863+00:00", "engine": { "name": "BSI-WID", "version": "1.3.10" } }, "id": "WID-SEC-W-2024-3610", "initial_release_date": "2024-12-04T23:00:00.000+00:00", "revision_history": [ { "date": "2024-12-04T23:00:00.000+00:00", "number": "1", "summary": "Initiale Fassung" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "Series Multilayer Switches", "product": { "name": "Cisco MDS 9000 Series Multilayer Switches", "product_id": "T039576", "product_identification_helper": { "cpe": "cpe:/o:cisco:mds_9000:series_multilayer_switches" } } } ], "category": "product_name", "name": "MDS 9000" }, { "category": "product_name", "name": "Cisco NX-OS", "product": { "name": "Cisco NX-OS", "product_id": "T039570", "product_identification_helper": { "cpe": "cpe:/o:cisco:nx-os:-" } } }, { "branches": [ { "category": "product_version", "name": "7000 Series Switches", "product": { "name": "Cisco Nexus 7000 Series Switches", "product_id": "T039571", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:7000_series_switches" } } }, { "category": "product_version", "name": "3000 Series Switches", "product": { "name": "Cisco Nexus 3000 Series Switches", "product_id": "T039572", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:3000_series_switches" } } }, { "category": "product_version", "name": "9000 Series Fabric Switches", "product": { "name": "Cisco Nexus 9000 Series Fabric Switches", "product_id": "T039573", "product_identification_helper": { "cpe": "cpe:/h:cisco:nexus:9000_series_fabric_switches" } } } ], "category": "product_name", "name": "Nexus" }, { "branches": [ { "category": "product_version", "name": "6400 Series Fabric Interconnects", "product": { "name": "Cisco Unified Computing System (UCS) 6400 Series Fabric Interconnects", "product_id": "T039574", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_computing_system:6400_series_fabric_interconnects" } } }, { "category": "product_version", "name": "6500 Series Fabric Interconnects", "product": { "name": "Cisco Unified Computing System (UCS) 6500 Series Fabric Interconnects", "product_id": "T039575", "product_identification_helper": { "cpe": "cpe:/h:cisco:unified_computing_system:6500_series_fabric_interconnects" } } } ], "category": "product_name", "name": "Unified Computing System (UCS)" } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2024-20397", "notes": [ { "category": "description", "text": "Es besteht eine Schwachstelle in Cisco NX-OS, Cisco Nexus, Cisco Unified Computing System (UCS) und Cisco MDS 9000. Dieser Fehler existiert im Bootloader der Cisco NX-OS Software wegen unsicherer Bootloader-Einstellungen. Durch die Ausf\u00fchrung einer Reihe von Bootloader-Befehlen kann ein Angreifer mit physischem Zugriff diese Schwachstelle ausnutzen, um die \u00dcberpr\u00fcfung der NX-OS-Image-Signatur zu umgehen." } ], "product_status": { "known_affected": [ "T039571", "T039570", "T039573", "T039572", "T039575", "T039574", "T039576" ] }, "release_date": "2024-12-04T23:00:00.000+00:00", "title": "CVE-2024-20397" } ] }
cve-2024-20397
Vulnerability from cvelistv5
Published
2024-12-04 16:13
Modified
2024-12-04 21:39
Severity ?
EPSS score ?
Summary
A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification.
This vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software.
References
Impacted products
Vendor | Product | Version | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Cisco | Cisco NX-OS Software |
Version: 8.2(5) Version: 7.3(5)D1(1) Version: 8.4(2) Version: 8.4(3) Version: 9.2(3) Version: 7.0(3)I5(2) Version: 8.2(1) Version: 6.0(2)A8(7a) Version: 7.0(3)I4(5) Version: 7.3(1)D1(1) Version: 7.0(3)I4(6) Version: 7.0(3)I4(3) Version: 9.2(2v) Version: 7.3(0)D1(1) Version: 7.0(3)I4(7) Version: 7.0(3)I4(1) Version: 7.0(3)I4(8) Version: 7.0(3)I4(2) Version: 6.0(2)A8(11) Version: 7.3(4)D1(1) Version: 9.2(1) Version: 9.2(2t) Version: 9.2(3y) Version: 7.0(3)I4(1t) Version: 7.0(3)I7(6z) Version: 9.3(2) Version: 7.3(1)DY(1) Version: 7.0(3)F3(3) Version: 7.0(3)I7(3z) Version: 7.0(3)IM7(2) Version: 6.0(2)A8(11b) Version: 7.0(3)I7(5a) Version: 8.1(1) Version: 7.0(3)I6(1) Version: 8.2(2) Version: 7.0(3)I5(3b) Version: 8.3(2) Version: 7.3(2)D1(3a) Version: 9.2(4) Version: 6.0(2)A8(10) Version: 6.0(2)A8(2) Version: 7.0(3)IC4(4) Version: 8.1(2) Version: 7.0(3)F3(3c) Version: 7.3(3)D1(1) Version: 7.0(3)F3(1) Version: 7.0(3)F3(5) Version: 8.2(3) Version: 7.0(3)I7(2) Version: 7.0(3)I5(3) Version: 7.0(3)I7(3) Version: 6.0(2)A8(6) Version: 7.0(3)I6(2) Version: 8.3(1) Version: 8.4(1) Version: 8.1(1b) Version: 6.0(2)A8(5) Version: 7.3(0)DX(1) Version: 7.3(2)D1(1) Version: 9.3(1) Version: 6.0(2)A8(7) Version: 7.0(3)I7(6) Version: 7.3(2)D1(2) Version: 6.0(2)A8(11a) Version: 7.0(3)I4(8z) Version: 7.0(3)I4(9) Version: 8.2(4) Version: 7.0(3)I7(4) Version: 7.0(3)I7(7) Version: 7.3(0)DY(1) Version: 6.0(2)A8(9) Version: 6.0(2)A8(1) Version: 6.0(2)A8(10a) Version: 7.0(3)I5(1) Version: 9.3(1z) Version: 9.2(2) Version: 7.0(3)F3(4) Version: 7.0(3)I4(8b) Version: 8.1(2a) Version: 7.3(2)D1(3) Version: 6.0(2)A8(3) Version: 7.0(3)I4(6t) Version: 7.0(3)I5(3a) Version: 8.1(1a) Version: 6.0(2)A8(8) Version: 7.0(3)I7(5) Version: 7.0(3)F3(3a) Version: 6.0(2)A8(4) Version: 7.0(3)I4(8a) Version: 7.0(3)F3(2) Version: 7.0(3)I4(4) Version: 7.0(3)I7(1) Version: 7.0(3)IA7(2) Version: 7.0(3)IA7(1) Version: 6.0(2)A8(7b) Version: 6.0(2)A8(4a) Version: 8.4(1a) Version: 9.3(3) Version: 7.3(2)D1(1d) Version: 7.0(3)I7(8) Version: 9.3(4) Version: 7.3(6)D1(1) Version: 8.2(6) Version: 9.3(5) Version: 8.4(2a) Version: 8.4(2b) Version: 7.0(3)I7(9) Version: 8.5(1) Version: 9.3(6) Version: 10.1(2) Version: 10.1(1) Version: 8.4(4) Version: 7.3(7)D1(1) Version: 8.4(2c) Version: 9.3(5w) Version: 8.2(7) Version: 9.3(7) Version: 9.3(7k) Version: 7.0(3)I7(9w) Version: 10.2(1) Version: 7.3(8)D1(1) Version: 9.3(7a) Version: 8.2(7a) Version: 9.3(8) Version: 8.4(4a) Version: 8.4(2d) Version: 8.4(5) Version: 7.0(3)I7(10) Version: 8.2(8) Version: 10.2(1q) Version: 10.2(2) Version: 9.3(9) Version: 10.1(2t) Version: 7.3(9)D1(1) Version: 10.2(3) Version: 8.4(6) Version: 10.2(3t) Version: 8.4(2e) Version: 9.3(10) Version: 10.2(2a) Version: 9.2(1a) Version: 8.2(9) Version: 10.3(1) Version: 10.2(4) Version: 8.4(7) Version: 10.3(2) Version: 8.4(6a) Version: 9.3(11) Version: 10.3(3) Version: 10.2(5) Version: 9.4(1) Version: 9.3(2a) Version: 8.4(2f) Version: 8.2(10) Version: 9.3(12) Version: 10.2(3v) Version: 10.4(1) Version: 8.4(8) Version: 10.3(99w) Version: 10.2(6) Version: 10.3(3w) Version: 10.3(99x) Version: 10.3(3o) Version: 8.4(9) Version: 10.3(4) Version: 10.3(3p) Version: 10.3(4a) Version: 9.4(1a) Version: 10.4(2) Version: 10.3(3q) Version: 9.3(13) Version: 8.2(11) Version: 10.3(5) Version: 10.2(7) Version: 10.4(3) Version: 10.3(3x) Version: 10.3(4g) Version: 10.5(1) Version: 10.2(8) Version: 10.3(3r) Version: 10.3(6) Version: 9.3(14) Version: 10.4(4) Version: 10.3(4h) |
||||||||
|
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-20397", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-12-04T19:27:41.534598Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-12-04T21:39:35.478Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unknown", "product": "Cisco NX-OS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "8.2(5)" }, { "status": "affected", "version": "7.3(5)D1(1)" }, { "status": "affected", "version": "8.4(2)" }, { "status": "affected", "version": "8.4(3)" }, { "status": "affected", "version": "9.2(3)" }, { "status": "affected", "version": "7.0(3)I5(2)" }, { "status": "affected", "version": "8.2(1)" }, { "status": "affected", "version": "6.0(2)A8(7a)" }, { "status": "affected", "version": "7.0(3)I4(5)" }, { "status": "affected", "version": "7.3(1)D1(1)" }, { "status": "affected", "version": "7.0(3)I4(6)" }, { "status": "affected", "version": "7.0(3)I4(3)" }, { "status": "affected", "version": "9.2(2v)" }, { "status": "affected", "version": "7.3(0)D1(1)" }, { "status": "affected", "version": "7.0(3)I4(7)" }, { "status": "affected", "version": "7.0(3)I4(1)" }, { "status": "affected", "version": "7.0(3)I4(8)" }, { "status": "affected", "version": "7.0(3)I4(2)" }, { "status": "affected", "version": "6.0(2)A8(11)" }, { "status": "affected", "version": "7.3(4)D1(1)" }, { "status": "affected", "version": "9.2(1)" }, { "status": "affected", "version": "9.2(2t)" }, { "status": "affected", "version": "9.2(3y)" }, { "status": "affected", "version": "7.0(3)I4(1t)" }, { "status": "affected", "version": "7.0(3)I7(6z)" }, { "status": "affected", "version": "9.3(2)" }, { "status": "affected", "version": "7.3(1)DY(1)" }, { "status": "affected", "version": "7.0(3)F3(3)" }, { "status": "affected", "version": "7.0(3)I7(3z)" }, { "status": "affected", "version": "7.0(3)IM7(2)" }, { "status": "affected", "version": "6.0(2)A8(11b)" }, { "status": "affected", "version": "7.0(3)I7(5a)" }, { "status": "affected", "version": "8.1(1)" }, { "status": "affected", "version": "7.0(3)I6(1)" }, { "status": "affected", "version": "8.2(2)" }, { "status": "affected", "version": "7.0(3)I5(3b)" }, { "status": "affected", "version": "8.3(2)" }, { "status": "affected", "version": "7.3(2)D1(3a)" }, { "status": "affected", "version": "9.2(4)" }, { "status": "affected", "version": "6.0(2)A8(10)" }, { "status": "affected", "version": "6.0(2)A8(2)" }, { "status": "affected", "version": "7.0(3)IC4(4)" }, { "status": "affected", "version": "8.1(2)" }, { "status": "affected", "version": "7.0(3)F3(3c)" }, { "status": "affected", "version": "7.3(3)D1(1)" }, { "status": "affected", "version": "7.0(3)F3(1)" }, { "status": "affected", "version": "7.0(3)F3(5)" }, { "status": "affected", "version": "8.2(3)" }, { "status": "affected", "version": "7.0(3)I7(2)" }, { "status": "affected", "version": "7.0(3)I5(3)" }, { "status": "affected", "version": "7.0(3)I7(3)" }, { "status": "affected", "version": "6.0(2)A8(6)" }, { "status": "affected", "version": "7.0(3)I6(2)" }, { "status": "affected", "version": "8.3(1)" }, { "status": "affected", "version": "8.4(1)" }, { "status": "affected", "version": "8.1(1b)" }, { "status": "affected", "version": "6.0(2)A8(5)" }, { "status": "affected", "version": "7.3(0)DX(1)" }, { "status": "affected", "version": "7.3(2)D1(1)" }, { "status": "affected", "version": "9.3(1)" }, { "status": "affected", "version": "6.0(2)A8(7)" }, { "status": "affected", "version": "7.0(3)I7(6)" }, { "status": "affected", "version": "7.3(2)D1(2)" }, { "status": "affected", "version": "6.0(2)A8(11a)" }, { "status": "affected", "version": "7.0(3)I4(8z)" }, { "status": "affected", "version": "7.0(3)I4(9)" }, { "status": "affected", "version": "8.2(4)" }, { "status": "affected", "version": "7.0(3)I7(4)" }, { "status": "affected", "version": "7.0(3)I7(7)" }, { "status": "affected", "version": "7.3(0)DY(1)" }, { "status": "affected", "version": "6.0(2)A8(9)" }, { "status": "affected", "version": "6.0(2)A8(1)" }, { "status": "affected", "version": "6.0(2)A8(10a)" }, { "status": "affected", "version": "7.0(3)I5(1)" }, { "status": "affected", "version": "9.3(1z)" }, { "status": "affected", "version": "9.2(2)" }, { "status": "affected", "version": "7.0(3)F3(4)" }, { "status": "affected", "version": "7.0(3)I4(8b)" }, { "status": "affected", "version": "8.1(2a)" }, { "status": "affected", "version": "7.3(2)D1(3)" }, { "status": "affected", "version": "6.0(2)A8(3)" }, { "status": "affected", "version": "7.0(3)I4(6t)" }, { "status": "affected", "version": "7.0(3)I5(3a)" }, { "status": "affected", "version": "8.1(1a)" }, { "status": "affected", "version": "6.0(2)A8(8)" }, { "status": "affected", "version": "7.0(3)I7(5)" }, { "status": "affected", "version": "7.0(3)F3(3a)" }, { "status": "affected", "version": "6.0(2)A8(4)" }, { "status": "affected", "version": "7.0(3)I4(8a)" }, { "status": "affected", "version": "7.0(3)F3(2)" }, { "status": "affected", "version": "7.0(3)I4(4)" }, { "status": "affected", "version": "7.0(3)I7(1)" }, { "status": "affected", "version": "7.0(3)IA7(2)" }, { "status": "affected", "version": "7.0(3)IA7(1)" }, { "status": "affected", "version": "6.0(2)A8(7b)" }, { "status": "affected", "version": "6.0(2)A8(4a)" }, { "status": "affected", "version": "8.4(1a)" }, { "status": "affected", "version": "9.3(3)" }, { "status": "affected", "version": "7.3(2)D1(1d)" }, { "status": "affected", "version": "7.0(3)I7(8)" }, { "status": "affected", "version": "9.3(4)" }, { "status": "affected", "version": "7.3(6)D1(1)" }, { "status": "affected", "version": "8.2(6)" }, { "status": "affected", "version": "9.3(5)" }, { "status": "affected", "version": "8.4(2a)" }, { "status": "affected", "version": "8.4(2b)" }, { "status": "affected", "version": "7.0(3)I7(9)" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "9.3(6)" }, { "status": "affected", "version": "10.1(2)" }, { "status": "affected", "version": "10.1(1)" }, { "status": "affected", "version": "8.4(4)" }, { "status": "affected", "version": "7.3(7)D1(1)" }, { "status": "affected", "version": "8.4(2c)" }, { "status": "affected", "version": "9.3(5w)" }, { "status": "affected", "version": "8.2(7)" }, { "status": "affected", "version": "9.3(7)" }, { "status": "affected", "version": "9.3(7k)" }, { "status": "affected", "version": "7.0(3)I7(9w)" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "7.3(8)D1(1)" }, { "status": "affected", "version": "9.3(7a)" }, { "status": "affected", "version": "8.2(7a)" }, { "status": "affected", "version": "9.3(8)" }, { "status": "affected", "version": "8.4(4a)" }, { "status": "affected", "version": "8.4(2d)" }, { "status": "affected", "version": "8.4(5)" }, { "status": "affected", "version": "7.0(3)I7(10)" }, { "status": "affected", "version": "8.2(8)" }, { "status": "affected", "version": "10.2(1q)" }, { "status": "affected", "version": "10.2(2)" }, { "status": "affected", "version": "9.3(9)" }, { "status": "affected", "version": "10.1(2t)" }, { "status": "affected", "version": "7.3(9)D1(1)" }, { "status": "affected", "version": "10.2(3)" }, { "status": "affected", "version": "8.4(6)" }, { "status": "affected", "version": "10.2(3t)" }, { "status": "affected", "version": "8.4(2e)" }, { "status": "affected", "version": "9.3(10)" }, { "status": "affected", "version": "10.2(2a)" }, { "status": "affected", "version": "9.2(1a)" }, { "status": "affected", "version": "8.2(9)" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.2(4)" }, { "status": "affected", "version": "8.4(7)" }, { "status": "affected", "version": "10.3(2)" }, { "status": "affected", "version": "8.4(6a)" }, { "status": "affected", "version": "9.3(11)" }, { "status": "affected", "version": "10.3(3)" }, { "status": "affected", "version": "10.2(5)" }, { "status": "affected", "version": "9.4(1)" }, { "status": "affected", "version": "9.3(2a)" }, { "status": "affected", "version": "8.4(2f)" }, { "status": "affected", "version": "8.2(10)" }, { "status": "affected", "version": "9.3(12)" }, { "status": "affected", "version": "10.2(3v)" }, { "status": "affected", "version": "10.4(1)" }, { "status": "affected", "version": "8.4(8)" }, { "status": "affected", "version": "10.3(99w)" }, { "status": "affected", "version": "10.2(6)" }, { "status": "affected", "version": "10.3(3w)" }, { "status": "affected", "version": "10.3(99x)" }, { "status": "affected", "version": "10.3(3o)" }, { "status": "affected", "version": "8.4(9)" }, { "status": "affected", "version": "10.3(4)" }, { "status": "affected", "version": "10.3(3p)" }, { "status": "affected", "version": "10.3(4a)" }, { "status": "affected", "version": "9.4(1a)" }, { "status": "affected", "version": "10.4(2)" }, { "status": "affected", "version": "10.3(3q)" }, { "status": "affected", "version": "9.3(13)" }, { "status": "affected", "version": "8.2(11)" }, { "status": "affected", "version": "10.3(5)" }, { "status": "affected", "version": "10.2(7)" }, { "status": "affected", "version": "10.4(3)" }, { "status": "affected", "version": "10.3(3x)" }, { "status": "affected", "version": "10.3(4g)" }, { "status": "affected", "version": "10.5(1)" }, { "status": "affected", "version": "10.2(8)" }, { "status": "affected", "version": "10.3(3r)" }, { "status": "affected", "version": "10.3(6)" }, { "status": "affected", "version": "9.3(14)" }, { "status": "affected", "version": "10.4(4)" }, { "status": "affected", "version": "10.3(4h)" } ] }, { "defaultStatus": "unknown", "product": "Cisco NX-OS System Software in ACI Mode", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "14.1(1j)" }, { "status": "affected", "version": "14.0(3d)" }, { "status": "affected", "version": "14.1(1k)" }, { "status": "affected", "version": "13.2(1m)" }, { "status": "affected", "version": "14.0(3c)" }, { "status": "affected", "version": "13.2(2l)" }, { "status": "affected", "version": "13.2(7k)" }, { "status": "affected", "version": "14.1(1l)" }, { "status": "affected", "version": "14.2(2f)" }, { "status": "affected", "version": "13.2(3s)" }, { "status": "affected", "version": "13.2(2o)" }, { "status": "affected", "version": "14.0(2c)" }, { "status": "affected", "version": "14.1(2m)" }, { "status": "affected", "version": "13.2(5e)" }, { "status": "affected", "version": "14.1(2o)" }, { "status": "affected", "version": "13.2(7f)" }, { "status": "affected", "version": "13.2(41d)" }, { "status": "affected", "version": "13.2(4d)" }, { "status": "affected", "version": "13.2(3o)" }, { "status": "affected", "version": "13.2(1l)" }, { "status": "affected", "version": "14.0(1h)" }, { "status": "affected", "version": "13.2(3n)" }, { "status": "affected", "version": "14.2(1l)" }, { "status": "affected", "version": "14.2(2e)" }, { "status": "affected", "version": "13.2(4e)" }, { "status": "affected", "version": "14.2(1i)" }, { "status": "affected", "version": "13.2(9b)" }, { "status": "affected", "version": "14.1(2s)" }, { "status": "affected", "version": "14.1(1i)" }, { "status": "affected", "version": "14.1(2g)" }, { "status": "affected", "version": "13.2(3j)" }, { "status": "affected", "version": "13.2(5d)" }, { "status": "affected", "version": "13.2(6i)" }, { "status": "affected", "version": "14.1(2u)" }, { "status": "affected", "version": "13.2(3i)" }, { "status": "affected", "version": "13.2(3r)" }, { "status": "affected", "version": "13.2(5f)" }, { "status": "affected", "version": "14.2(1j)" }, { "status": "affected", "version": "14.1(2w)" }, { "status": "affected", "version": "14.2(3n)" }, { "status": "affected", "version": "14.2(3l)" }, { "status": "affected", "version": "14.2(3j)" }, { "status": "affected", "version": "14.2(2g)" }, { "status": "affected", "version": "13.2(8d)" }, { "status": "affected", "version": "14.1(2x)" }, { "status": "affected", "version": "13.2(9f)" }, { "status": "affected", "version": "14.2(3q)" }, { "status": "affected", "version": "14.2(4i)" }, { "status": "affected", "version": "13.2(9h)" }, { "status": "affected", "version": "15.0(1k)" }, { "status": "affected", "version": "14.2(4k)" }, { "status": "affected", "version": "15.0(1l)" }, { "status": "affected", "version": "15.0(2e)" }, { "status": "affected", "version": "14.2(4o)" }, { "status": "affected", "version": "14.2(4p)" }, { "status": "affected", "version": "15.0(2h)" }, { "status": "affected", "version": "14.2(5k)" }, { "status": "affected", "version": "14.2(5l)" }, { "status": "affected", "version": "14.2(5n)" }, { "status": "affected", "version": "15.1(1h)" }, { "status": "affected", "version": "14.2(6d)" }, { "status": "affected", "version": "15.1(2e)" }, { "status": "affected", "version": "14.2(6g)" }, { "status": "affected", "version": "14.2(6h)" }, { "status": "affected", "version": "15.1(3e)" }, { "status": "affected", "version": "13.2(10e)" }, { "status": "affected", "version": "14.2(6l)" }, { "status": "affected", "version": "14.2(7f)" }, { "status": "affected", "version": "15.1(4c)" }, { "status": "affected", "version": "14.2(6o)" }, { "status": "affected", "version": "15.2(1g)" }, { "status": "affected", "version": "15.2(2e)" }, { "status": "affected", "version": "14.2(7l)" }, { "status": "affected", "version": "13.2(10f)" }, { "status": "affected", "version": "15.2(2f)" }, { "status": "affected", "version": "15.2(2g)" }, { "status": "affected", "version": "14.2(7q)" }, { "status": "affected", "version": "15.2(2h)" }, { "status": "affected", "version": "15.2(3f)" }, { "status": "affected", "version": "15.2(3e)" }, { "status": "affected", "version": "15.2(3g)" }, { "status": "affected", "version": "14.2(7r)" }, { "status": "affected", "version": "14.2(7s)" }, { "status": "affected", "version": "15.2(4d)" }, { "status": "affected", "version": "15.2(4e)" }, { "status": "affected", "version": "14.2(7t)" }, { "status": "affected", "version": "15.2(5c)" }, { "status": "affected", "version": "15.2(5d)" }, { "status": "affected", "version": "13.2(10g)" }, { "status": "affected", "version": "16.0(1g)" }, { "status": "affected", "version": "14.2(7u)" }, { "status": "affected", "version": "15.2(5e)" }, { "status": "affected", "version": "15.2(4f)" }, { "status": "affected", "version": "15.2(6e)" }, { "status": "affected", "version": "15.2(6h)" }, { "status": "affected", "version": "16.0(1j)" }, { "status": "affected", "version": "15.2(6g)" }, { "status": "affected", "version": "15.2(7f)" }, { "status": "affected", "version": "14.2(7v)" }, { "status": "affected", "version": "15.2(7g)" }, { "status": "affected", "version": "16.0(2h)" }, { "status": "affected", "version": "14.2(7w)" }, { "status": "affected", "version": "15.2(8d)" }, { "status": "affected", "version": "16.0(2j)" }, { "status": "affected", "version": "15.2(8e)" }, { "status": "affected", "version": "16.0(3d)" }, { "status": "affected", "version": "16.0(3e)" }, { "status": "affected", "version": "15.2(8f)" }, { "status": "affected", "version": "15.2(8g)" }, { "status": "affected", "version": "15.3(1d)" }, { "status": "affected", "version": "15.2(8h)" }, { "status": "affected", "version": "16.0(4c)" }, { "status": "affected", "version": "15.3(2a)" }, { "status": "affected", "version": "15.2(8i)" }, { "status": "affected", "version": "16.0(5h)" }, { "status": "affected", "version": "15.3(2b)" }, { "status": "affected", "version": "16.0(3g)" }, { "status": "affected", "version": "16.0(5j)" }, { "status": "affected", "version": "15.3(2c)" }, { "status": "affected", "version": "16.0(6c)" }, { "status": "affected", "version": "15.3(2d)" }, { "status": "affected", "version": "16.1(1f)" }, { "status": "affected", "version": "16.0(7e)" }, { "status": "affected", "version": "16.0(8e)" } ] }, { "defaultStatus": "unknown", "product": "Cisco Unified Computing System (Managed)", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.0(4c)" }, { "status": "affected", "version": "4.0(2b)" }, { "status": "affected", "version": "4.1(2a)" }, { "status": "affected", "version": "4.0(1a)" }, { "status": "affected", "version": "4.0(2a)" }, { "status": "affected", "version": "4.0(1b)" }, { "status": "affected", "version": "4.1(1c)" }, { "status": "affected", "version": "4.0(4a)" }, { "status": "affected", "version": "4.0(4b)" }, { "status": "affected", "version": "4.0(2e)" }, { "status": "affected", "version": "4.1(1a)" }, { "status": "affected", "version": "4.0(4d)" }, { "status": "affected", "version": "4.0(4h)" }, { "status": "affected", "version": "4.0(4g)" }, { "status": "affected", "version": "4.0(1d)" }, { "status": "affected", "version": "4.1(1e)" }, { "status": "affected", "version": "4.0(4f)" }, { "status": "affected", "version": "4.0(4e)" }, { "status": "affected", "version": "4.0(4i)" }, { "status": "affected", "version": "4.1(1d)" }, { "status": "affected", "version": "4.0(2d)" }, { "status": "affected", "version": "4.1(1b)" }, { "status": "affected", "version": "4.0(1c)" }, { "status": "affected", "version": "4.1(2b)" }, { "status": "affected", "version": "4.0(4k)" }, { "status": "affected", "version": "4.1(3a)" }, { "status": "affected", "version": "4.1(3b)" }, { "status": "affected", "version": "4.1(2c)" }, { "status": "affected", "version": "4.0(4l)" }, { "status": "affected", "version": "4.1(4a)" }, { "status": "affected", "version": "4.1(3c)" }, { "status": "affected", "version": "4.1(3d)" }, { "status": "affected", "version": "4.2(1c)" }, { "status": "affected", "version": "4.2(1d)" }, { "status": "affected", "version": "4.0(4m)" }, { "status": "affected", "version": "4.1(3e)" }, { "status": "affected", "version": "4.2(1f)" }, { "status": "affected", "version": "4.1(3f)" }, { "status": "affected", "version": "4.2(1i)" }, { "status": "affected", "version": "4.1(3h)" }, { "status": "affected", "version": "4.2(1k)" }, { "status": "affected", "version": "4.2(1l)" }, { "status": "affected", "version": "4.0(4n)" }, { "status": "affected", "version": "4.2(1m)" }, { "status": "affected", "version": "4.1(3i)" }, { "status": "affected", "version": "4.2(2a)" }, { "status": "affected", "version": "4.2(1n)" }, { "status": "affected", "version": "4.1(3j)" }, { "status": "affected", "version": "4.2(2c)" }, { "status": "affected", "version": "4.2(2d)" }, { "status": "affected", "version": "4.2(3b)" }, { "status": "affected", "version": "4.1(3k)" }, { "status": "affected", "version": "4.0(4o)" }, { "status": "affected", "version": "4.2(2e)" }, { "status": "affected", "version": "4.2(3d)" }, { "status": "affected", "version": "4.2(3e)" }, { "status": "affected", "version": "4.2(3g)" }, { "status": "affected", "version": "4.1(3l)" }, { "status": "affected", "version": "4.3(2b)" }, { "status": "affected", "version": "4.2(3h)" }, { "status": "affected", "version": "4.2(3i)" }, { "status": "affected", "version": "4.3(2c)" }, { "status": "affected", "version": "4.1(3m)" }, { "status": "affected", "version": "4.3(2e)" }, { "status": "affected", "version": "4.3(3a)" }, { "status": "affected", "version": "4.2(3j)" }, { "status": "affected", "version": "4.3(3c)" }, { "status": "affected", "version": "4.2(3k)" }, { "status": "affected", "version": "4.2(3l)" }, { "status": "affected", "version": "4.3(2f)" }, { "status": "affected", "version": "4.2(3m)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification.\r\n\r\nThis vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software." } ], "exploits": [ { "lang": "en", "value": "The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "PHYSICAL", "availabilityImpact": "NONE", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:N", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-284", "description": "Improper Access Control", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-12-04T16:13:13.890Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-nxos-image-sig-bypas-pQDRQvjL", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-image-sig-bypas-pQDRQvjL" } ], "source": { "advisory": "cisco-sa-nxos-image-sig-bypas-pQDRQvjL", "defects": [ "CSCwm47438" ], "discovery": "EXTERNAL" }, "title": "Cisco NX-OS Software Image Verification Bypass Vulnerability" } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2024-20397", "datePublished": "2024-12-04T16:13:13.890Z", "dateReserved": "2023-11-08T15:08:07.660Z", "dateUpdated": "2024-12-04T21:39:35.478Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.