Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2021.0705 Cisco NX-OS Software: Multiple Vulnerabilities 25 February 2021 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Cisco NX-OS Publisher: Cisco Systems Operating System: Cisco Virtualisation Impact/Access: Root Compromise -- Remote/Unauthenticated Modify Arbitrary Files -- Remote/Unauthenticated Denial of Service -- Remote/Unauthenticated Cross-site Request Forgery -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2021-1387 CVE-2021-1367 CVE-2021-1361 CVE-2021-1229 CVE-2021-1227 Original Bulletin: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipv6-netstack-edXPGV7K https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-csrf-wRMzWL9z https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-pim-dos-Y8SjMz4 https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3000-9000-fileaction-QtLzDRy2 Comment: This bulletin contains five (5) Cisco Systems security advisories. - --------------------------BEGIN INCLUDED TEXT-------------------- Cisco NX-OS Software ICMP Version 6 Memory Leak Denial of Service Vulnerability Priority: Medium Advisory ID: cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq First Published: 2021 February 24 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv24541 CSCvv96592 CSCvv96593 CVE Names: CVE-2021-1229 CWEs: CWE-401 Summary o A vulnerability in ICMP Version 6 (ICMPv6) processing in Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a slow system memory leak, which over time could lead to a denial of service (DoS) condition. This vulnerability is due to improper error handling when an IPv6-configured interface receives a specific type of ICMPv6 packet. An attacker could exploit this vulnerability by sending a sustained rate of crafted ICMPv6 packets to a local IPv6 address on a targeted device. A successful exploit could allow the attacker to cause a system memory leak in the ICMPv6 process on the device. As a result, the ICMPv6 process could run out of system memory and stop processing traffic. The device could then drop all ICMPv6 packets, causing traffic instability on the device. Restoring device functionality would require a device reboot. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq Affected Products o Vulnerable Products At the time of publication, this vulnerability affected the following Cisco products if they were running a vulnerable release of Cisco NX-OS Software and had at least one interface configured for IPv6 traffic: MDS 9000 Series Multilayer Switches ( CSCvv24541 ) Nexus 1000 Virtual Edge for VMware vSphere ( CSCvv96593 ) Nexus 1000V Switch for Microsoft Hyper-V ( CSCvv96593 ) Nexus 1000V Switch for VMware vSphere ( CSCvv96593 ) Nexus 3000 Series Switches ( CSCvv24541 ) Nexus 5500 Platform Switches ( CSCvv24541 ) Nexus 5600 Platform Switches ( CSCvv24541 ) Nexus 6000 Series Switches ( CSCvv24541 ) Nexus 7000 Series Switches ( CSCvv24541 ) Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode ( CSCvv96592 ) Nexus 9000 Series Switches in standalone NX-OS mode ( CSCvv24541 ) For information about which Cisco software releases were vulnerable at the time of publication, see the Fixed Software section of this advisory. See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Determine the Status of IPv6 on Cisco NX-OS Software To determine whether a device will accept incoming IPv6 packets, use the show ipv6 interface brief vrf all command at the device CLI. A device could be affected by this vulnerability if the command returns an IPv6 interface status from at least one interface, as shown in the following example: Switch# show ipv6 interface brief vrf all IPv6 Interface Status for VRF "default"(1) Interface IPv6 Address/Link-local Address Interface Status prot/link/admin Eth1/65 2001:db8:1:f101::1 up/up/up fe80::23a:7dff:fe95:d071 IPv6 Interface Status for VRF "management"(2) Interface IPv6 Address/Link-local Address Interface Status prot/link/admin Note: By default, no IPv6 addresses are enabled in Cisco NX-OS Software. An interface of a Nexus device can be configured with an IPv6 address through the ipv6 address [...] or ipv6 link-local [...] CLI configuration commands. Also, the ipv6 forward CLI configuration command can be used to allow an interface to accept IPv6 packets even if no IPv6 address is configured. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: Firepower 1000 Series Firepower 2100 Series Firepower 4100 Series Firepower 9300 Security Appliances UCS 6200 Series Fabric Interconnects UCS 6300 Series Fabric Interconnects UCS 6400 Series Fabric Interconnects Indicators of Compromise o This vulnerability causes a system memory leak in the ICMPv6 process. ICMPv6 memory exhaustion can result in device instability. The following indicators of compromise that may occur if this vulnerability is being actively exploited. Contact the Cisco Technical Assistance Center (TAC) if additional help is needed to determine whether this vulnerability may have been exploited on the device. Memory Allocation Exploitation of this vulnerability will cause the IPCMPv6 process to continue allocating memory until the memory limit is reached. This memory is not returned, and a device reboot is required to recover. Use the show processes memory sort command at the CLI to monitor the MemUsed field. The command output also shows the memory limit. nxos# show processes memory sort PID MemAlloc MemLimit MemUsed StackBase/Ptr Process ----- -------- ---------- ---------- ----------------- ----------- 7073 561393664 1067925798 1152303104 ffc80440/ffc7fed0 icmpv6 If the show processes memory sort command is not available, use the show processes memory | include icmpv6 command at the CLI: nxos# show processes memory | include icmpv6 PID MemAlloc MemLimit MemUsed StackBase/Ptr Process ----- -------- ---------- ---------- ----------------- ----------- 27418 26259456 1366538124 1000681472 ffca1d60/ffca1800 icmpv6 ICMPv6 Errors Monitor for syslog messages about ICMPv6 errors, such as the two that follow: %ICMPV6-3-ATIMERS_ERROR: malloc failed in heap_create %ICMPV6-3-ERROR: -Traceback: librsw.so+0x11250e librs w.so+0x10be66 libam.so+0xd7f3 libam.so+0xe4cd icmpv6=0x1004f000 0x100ed1b9 0x101 05623 0x10078fe7 libipv6.so+0x14988 librsw.so+0xc8658 libpthread.so.0+0x609b lib c.so.6+0xd6a5e Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco TAC or their contracted maintenance providers. Cisco NX-OS Software To help customers determine their exposure to vulnerabilities in Cisco NX-OS Software, Cisco provides the Cisco Software Checker to identify any Cisco Security Advisories that impact a specific Cisco NX-OS Software release and the earliest release that fixes the vulnerabilities that are described in each advisory ("First Fixed"). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified ("Combined First Fixed"). Customers can use the Cisco Software Checker to search advisories in the following ways: Choose the software, platform, and one or more releases Upload a .txt file that includes a list of specific releases Enter the output of the show version command After initiating a search, customers can customize the search to include all Cisco Security Advisories or one or more specific advisories. Customers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by choosing the Cisco NX-OS Software and platform and then entering a release-for example, 7.0(3)I7(5) for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software in ACI mode. By default, the Cisco Software Checker includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker and check the Medium check box in the drop-down list under Impact Rating when customizing a search. Cisco Nexus 7000 Series Switches SMUs For Cisco Nexus 7000 Series Switches, software maintenance upgrades (SMUs) are available for Cisco NX-OS Software Release 8.2(6). Customers can download the following SMUs from the Software Center on Cisco.com: n7000-s2-dk9.8.2.6.CSCvx15395.bin n7700-s2-dk9.8.2.6.CSCvx15395.bin For details about downloading and installing SMUs in Cisco NX-OS Software for Cisco Nexus 7000 Series Switches, see the Performing Software Maintenance Upgrades section of the Cisco Nexus 7000 Series NX-OS System Management Configuration Guide . See the Details section in the bug ID(s) at the top of this advisory for the most complete and current information. Additional Resources For help determining the best Cisco NX-OS Software release for a Cisco Nexus Switch, see the following Recommended Releases documents. If a security advisory recommends a later release, Cisco recommends following the advisory guidance. Cisco MDS Series Switches Cisco Nexus 1000V for VMware Switch Cisco Nexus 3000 Series Switches Cisco Nexus 5500 Platform Switches Cisco Nexus 5600 Platform Switches Cisco Nexus 6000 Series Switches Cisco Nexus 7000 Series Switches Cisco Nexus 9000 Series Switches Cisco Nexus 9000 Series ACI-Mode Switches To determine the best release for Cisco UCS Software, see the Recommended Releases documents in the release notes for the device. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-nxos-icmpv6-dos-YD55jVCq Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-FEB-24 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco NX-OS Software IPv6 Netstack Denial of Service Vulnerability Priority: High Advisory ID: cisco-sa-nxos-ipv6-netstack-edXPGV7K First Published: 2021 February 24 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvu11961 CSCvu77380 CVE Names: CVE-2021-1387 CWEs: CWE-401 Summary o A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because the software improperly releases resources when it processes certain IPv6 packets that are destined to an affected device. An attacker could exploit this vulnerability by sending multiple crafted IPv6 packets to an affected device. A successful exploit could cause the network stack to run out of available buffers, impairing operations of control plane and management plane protocols and resulting in a DoS condition. Manual intervention would be required to restore normal operations on the affected device. For more information about the impact of this vulnerability, see the Details section of this advisory. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipv6-netstack-edXPGV7K This advisory is part of the February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco NX-OS Software and have an IPv6 address or ipv6 forward configured on at least one interface: Nexus 3000 Series Switches ( CSCvu11961 ) Nexus 5500 Platform Switches ( CSCvu11961 ) Nexus 5600 Platform Switches ( CSCvu11961 ) Nexus 6000 Series Switches ( CSCvu11961 ) Nexus 7000 Series Switches ( CSCvu11961 ) Nexus 9000 Series Switches in standalone NX-OS mode ( CSCvu11961 ) UCS 6400 Series Fabric Interconnects ( CSCvu77380 ) For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory. Determine the Status of IPv6 on Cisco NX-OS Software To determine whether a device will accept incoming IPv6 packets, use the show ipv6 interface brief vrf all command at the device CLI. A device could be affected by this vulnerability if the command returns an IPv6 interface status from at least one interface, as shown in the following example: Switch# show ipv6 interface brief vrf all IPv6 Interface Status for VRF "default"(1) Interface IPv6 Address/Link-local Address Interface Status prot/link/admin Eth1/65 2001:db8:1:f101::1 up/up/up fe80::23a:7dff:fe95:d071 IPv6 Interface Status for VRF "management"(2) Interface IPv6 Address/Link-local Address Interface Status prot/link/admin Note: By default, no IPv6 addresses are enabled in Cisco NX-OS Software. An interface of a Nexus device can be configured with an IPv6 address through the ipv6 address [...] or ipv6 link-local [...] CLI configuration commands. Also, the ipv6 forward CLI configuration command can be used to allow an interface to accept IPv6 packets even if no IPv6 address is configured. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: Firepower 1000 Series Firepower 2100 Series Firepower 4100 Series Firepower 9300 Security Appliances MDS 9000 Series Multilayer Switches Nexus 1000 Virtual Edge for VMware vSphere Nexus 1000V Switch for Microsoft Hyper-V Nexus 1000V Switch for VMware vSphere Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode UCS 6200 Series Fabric Interconnects UCS 6300 Series Fabric Interconnects Details o This vulnerability is due to buffers not freeing properly in the Cisco NX-OS Software network stack known as netstack . If an affected device runs out of available buffers, it will stop processing incoming packets for multiple management plane protocols and control plane protocols (including routing protocols). This may cause those protocols to stop working properly on the affected device, resulting in operational failures that could impact traffic and cause a DoS condition. The impact could depend on the specific platform and the software release on the device. A manual reload of the device is required to restore normal operations. For this vulnerability to be exploited, the IPv6 traffic must be destined to an affected device. Traffic that transits an affected device cannot be used to exploit this vulnerability. Indicators of Compromise o Exploitation of this vulnerability could cause the affected device to consume all available network stack buffers and generate error messages similar to the following: 2021 Jan 25 16:07:39 nexus %NETSTACK-3-MBUF_FAILED: netstack [27340] m_copyin () failed in ipv6_data_main() ... 2021 Jan 25 16:07:44 nexus %NETSTACK-3-IPV6_API_FAILED: netstack [27340] m_copyin() failed in ipv6_process_pm_data_msg() These error messages could have multiple causes. Customers who observe these messages on a device are advised to contact their support organization to determine whether the messages indicate that the device has been compromised by exploitation of this vulnerability. Workarounds o There are no workarounds that address this vulnerability. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Cisco NX-OS Software To help customers determine their exposure to vulnerabilities in Cisco NX-OS Software, Cisco provides the Cisco Software Checker to identify any Cisco Security Advisories that impact a specific Cisco NX-OS Software release and the earliest release that fixes the vulnerabilities that are described in each advisory ("First Fixed"). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified ("Combined First Fixed"). Customers can use the Cisco Software Checker to search advisories in the following ways: Choose the software, platform, and one or more releases Upload a .txt file that includes a list of specific releases Enter the output of the show version command After initiating a search, customers can customize the search to include all Cisco Security Advisories or one or more specific advisories. Customers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by choosing the Cisco NX-OS Software and platform and then entering a release-for example, 7.0(3)I7(5) for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software in ACI mode. By default, the Cisco Software Checker includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker and check the Medium check box in the drop-down list under Impact Rating when customizing a search. Cisco UCS Software In the following table(s), the left column lists Cisco software releases. The center column indicates whether a release is affected by the vulnerability described in this advisory and the first release that includes the fix for this vulnerability. The right column indicates whether a release is affected by all the vulnerabilities described in this bundle and which release includes fixes for those vulnerabilities. UCS 6400 Series Fabric Interconnects Cisco UCS First Fixed Release First Fixed Release for All Software for This Vulnerabilities Described in the Bundle Release Vulnerability of Advisories 4.0 4.0(4k) 4.0(4k) 4.1 4.1(1e) 4.1(1e) Additional Resources For help determining the best Cisco NX-OS Software release for a Cisco Nexus Switch, see the following Recommended Releases documents. If a security advisory recommends a later release, Cisco recommends following the advisory guidance. Cisco MDS Series Switches Cisco Nexus 1000V for VMware Switch Cisco Nexus 3000 Series Switches Cisco Nexus 5500 Platform Switches Cisco Nexus 5600 Platform Switches Cisco Nexus 6000 Series Switches Cisco Nexus 7000 Series Switches Cisco Nexus 9000 Series Switches Cisco Nexus 9000 Series ACI-Mode Switches To determine the best release for Cisco UCS Software, see the Recommended Releases documents in the release notes for the device. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipv6-netstack-edXPGV7K Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-FEB-24 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco NX-OS Software NX-API Cross-Site Request Forgery Vulnerability Priority: High Advisory ID: cisco-sa-nxos-nxapi-csrf-wRMzWL9z First Published: 2021 February 24 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvr82908 CSCvu67365 CSCvv92342 CVE Names: CVE-2021-1227 CWEs: CWE-352 CVSS Score: 8.1 AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N/E:X/RL:X/RC:X Summary o A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system. This vulnerability is due to insufficient CSRF protections for the NX-API on an affected device. An attacker could exploit this vulnerability by persuading a user of the NX-API to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. The attacker could view and modify the device configuration. Note: The NX-API feature is disabled by default. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-csrf-wRMzWL9z This advisory is part of the February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco NX-OS Software and have the NX-API configured: MDS 9000 Series Multilayer Switches ( CSCvv92342 ) Nexus 3000 Series Switches ( CSCvr82908 ) Nexus 5500 Platform Switches ( CSCvu67365 ) Nexus 5600 Platform Switches ( CSCvu67365 ) Nexus 6000 Series Switches ( CSCvu67365 ) Nexus 7000 Series Switches ( CSCvv92342 ) Nexus 9000 Series Switches in standalone NX-OS mode ( CSCvr82908 ) Note: The NX-API feature is disabled by default. For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory. Determine the Device Configuration To determine whether an affected device is configured with the NX-API feature enabled, use the show feature | include nxapi command from the Cisco NX-OS CLI and verify that the feature is enabled. The following example shows the NX-API feature enabled on a device that is running Cisco NX-OS Software: nxos-switch# show feature | include nxapi nxapi 1 enabled Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: Firepower 1000 Series Firepower 2100 Series Firepower 4100 Series Firepower 9300 Security Appliances Nexus 1000 Virtual Edge for VMware vSphere Nexus 1000V Switch for Microsoft Hyper-V Nexus 1000V Switch for VMware vSphere Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode UCS 6200 Series Fabric Interconnects UCS 6300 Series Fabric Interconnects UCS 6400 Series Fabric Interconnects Details o On Cisco Nexus switches, CLIs are run only on the switches. The NX-API CLI is an enhancement to the Cisco NX-OS CLI system, which supports XML output. The NX-API CLI has the following features: Can be used on the switches Supports the JSON output format for specific commands Makes the CLIs available outside of the switch by using HTTP/HTTPS Supports show commands, configurations, and Linux Bash Workarounds o There are no workarounds that address this vulnerability. However, because a device is not affected by this vulnerability if the NX-API is not configured, administrators may consider disabling the NX-API as a mitigation. Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Cisco NX-OS Software To help customers determine their exposure to vulnerabilities in Cisco NX-OS Software, Cisco provides the Cisco Software Checker to identify any Cisco Security Advisories that impact a specific Cisco NX-OS Software release and the earliest release that fixes the vulnerabilities that are described in each advisory ("First Fixed"). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified ("Combined First Fixed"). Customers can use the Cisco Software Checker to search advisories in the following ways: Choose the software, platform, and one or more releases Upload a .txt file that includes a list of specific releases Enter the output of the show version command After initiating a search, customers can customize the search to include all Cisco Security Advisories or one or more specific advisories. Customers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by choosing the Cisco NX-OS Software and platform and then entering a release-for example, 7.0(3)I7(5) for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software in ACI mode. By default, the Cisco Software Checker includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker and check the Medium check box in the drop-down list under Impact Rating when customizing a search. Cisco Nexus 7000 Series Switches SMUs For Cisco Nexus 7000 Series Switches, SMUs are available for Cisco NX-OS Software Release 8.2(6). Download the following SMUs from the Software Center on Cisco.com: n7000-s2-dk9.8.2.6.CSCvx15395.bin n7700-s2-dk9.8.2.6.CSCvx15395.bin For details about downloading and installing SMUs in Cisco NX-OS Software for Cisco Nexus 7000 Series Switches, see the Performing Software Maintenance Upgrades section of the Cisco Nexus 7000 Series NX-OS System Management Configuration Guide . Additional Resources For help determining the best Cisco NX-OS Software release for a Cisco Nexus Switch, see the following Recommended Releases documents. If a security advisory recommends a later release, Cisco recommends following the advisory guidance. Cisco MDS Series Switches Cisco Nexus 1000V for VMware Switch Cisco Nexus 3000 Series Switches Cisco Nexus 5500 Platform Switches Cisco Nexus 5600 Platform Switches Cisco Nexus 6000 Series Switches Cisco Nexus 7000 Series Switches Cisco Nexus 9000 Series Switches Cisco Nexus 9000 Series ACI-Mode Switches To determine the best release for Cisco UCS Software, see the Recommended Releases documents in the release notes for the device. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during internal security testing. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-csrf-wRMzWL9z Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-FEB-24 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco NX-OS Software Protocol Independent Multicast Denial of Service Vulnerability Priority: Medium Advisory ID: cisco-sa-nxos-pim-dos-Y8SjMz4 First Published: 2021 February 24 16:00 GMT Version 1.0: Final Workarounds: No workarounds available Cisco Bug IDs: CSCvv98438 CVE Names: CVE-2021-1367 CWEs: CWE-20 Summary o A vulnerability in the Protocol Independent Multicast (PIM) feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted PIM packet to an affected device. A successful exploit could allow the attacker to cause a traffic loop, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-pim-dos-Y8SjMz4 Affected Products o Vulnerable Products At the time of publication, this vulnerability affected Cisco Nexus 9500 R-Series Switching Platforms if they were running a vulnerable release of Cisco NX-OS Software and had the feature pim command configured. For information about which Cisco software releases are vulnerable, see the Fixed Software section of this advisory. Note: No other Cisco Nexus 9000 Series Switches in standalone NX-OS mode are affected by this vulnerability. Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: Firepower 1000 Series Firepower 2100 Series Firepower 4100 Series Firepower 9300 Security Appliances MDS 9000 Series Multilayer Switches Nexus 1000 Virtual Edge for VMware vSphere Nexus 1000V Switch for Microsoft Hyper-V Nexus 1000V Switch for VMware vSphere Nexus 3000 Series Switches Nexus 5500 Platform Switches Nexus 5600 Platform Switches Nexus 6000 Series Switches Nexus 7000 Series Switches Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode UCS 6200 Series Fabric Interconnects UCS 6300 Series Fabric Interconnects UCS 6400 Series Fabric Interconnects Workarounds o There are no workarounds that address this vulnerability. Fixed Software o When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Cisco NX-OS Software To help customers determine their exposure to vulnerabilities in Cisco NX-OS Software, Cisco provides the Cisco Software Checker to identify any Cisco Security Advisories that impact a specific Cisco NX-OS Software release and the earliest release that fixes the vulnerabilities that are described in each advisory ("First Fixed"). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified ("Combined First Fixed"). Customers can use the Cisco Software Checker to search advisories in the following ways: Choose the software, platform, and one or more releases Upload a .txt file that includes a list of specific releases Enter the output of the show version command After initiating a search, customers can customize the search to include all Cisco Security Advisories or one or more specific advisories. Customers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by choosing the Cisco NX-OS Software and platform and then entering a release-for example, 7.0(3)I7(5) for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software in ACI mode. By default, the Cisco Software Checker includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker and check the Medium check box in the drop-down list under Impact Rating when customizing a search. Additional Resources For help determining the best Cisco NX-OS Software release for a Cisco Nexus Switch, see the following Recommended Releases documents. If a security advisory recommends a later release, Cisco recommends following the advisory guidance. Cisco MDS Series Switches Cisco Nexus 1000V for VMware Switch Cisco Nexus 3000 Series Switches Cisco Nexus 5500 Platform Switches Cisco Nexus 5600 Platform Switches Cisco Nexus 6000 Series Switches Cisco Nexus 7000 Series Switches Cisco Nexus 9000 Series Switches Cisco Nexus 9000 Series ACI-Mode Switches To determine the best release for Cisco UCS Software, see the Recommended Releases documents in the release notes for the device. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o This vulnerability was found during the resolution of a Cisco TAC support case. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-pim-dos-Y8SjMz4 Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-FEB-24 | +----------+---------------------------+----------+--------+--------------+ - -------------------------------------------------------------------------------- Cisco NX-OS Software Unauthenticated Arbitrary File Actions Vulnerability Priority: Critical Advisory ID: cisco-sa-3000-9000-fileaction-QtLzDRy2 First Published: 2021 February 24 16:00 GMT Version 1.0: Final Workarounds: Yes Cisco Bug IDs: CSCvw89875 CVE Names: CVE-2021-1361 CWEs: CWE-552 Summary o A vulnerability in the implementation of an internal file management service for Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode that are running Cisco NX-OS Software could allow an unauthenticated, remote attacker to create, delete, or overwrite arbitrary files with root privileges on the device. This vulnerability exists because TCP port 9075 is incorrectly configured to listen and respond to external connection requests. An attacker could exploit this vulnerability by sending crafted TCP packets to an IP address that is configured on a local interface on TCP port 9075. A successful exploit could allow the attacker to create, delete, or overwrite arbitrary files, including sensitive files that are related to the device configuration. For example, the attacker could add a user account without the device administrator knowing. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3000-9000-fileaction-QtLzDRy2 This advisory is part of the February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication . Affected Products o Vulnerable Products This vulnerability affects the following Cisco products if they are running Cisco NX-OS Software Release 9.3(5) or Release 9.3(6): Nexus 3000 Series Switches Nexus 9000 Series Switches in standalone NX-OS mode These devices are vulnerable by default. To check a device, use the show sockets connection | include 9075 CLI command. If the command returns output, as shown in the following example, the device is vulnerable: nexus# show sockets connection | include 9075 tcp LISTEN 0 32 * : 9075 Products Confirmed Not Vulnerable Only products listed in the Vulnerable Products section of this advisory are known to be affected by this vulnerability. Cisco has confirmed that this vulnerability does not affect the following Cisco products: Firepower 1000 Series Firepower 2100 Series Firepower 4100 Series Firepower 9300 Security Appliances MDS 9000 Series Multilayer Switches Nexus 1000 Virtual Edge for VMware vSphere Nexus 1000V Switch for Microsoft Hyper-V Nexus 1000V Switch for VMware vSphere Nexus 5500 Platform Switches Nexus 5600 Platform Switches Nexus 6000 Series Switches Nexus 7000 Series Switches Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode UCS 6200 Series Fabric Interconnects UCS 6300 Series Fabric Interconnects UCS 6400 Series Fabric Interconnects Workarounds o Using infrastructure access control lists (iACLs) to allow only strictly required management and control plane traffic that is destined to the affected device, as recommended in the Cisco Guide to Securing NX-OS Software Devices , would prevent remote exploitation of this vulnerability. Customers are advised to explicitly deny all TCP packets that are destined to a locally configured IP address with a destination port of 9075 as part of their iACLs. A customized control plane policing (CoPP) policy may also be used to drop all TCP port 9075 traffic that is destined to an affected device. Customers are advised to first evaluate the impact of configuration changes to the device and their security policy. Customers who are concerned about undesired or unexpected side effects are advised to contact their support organization before implementing configuration changes. In addition, local exploitation of this vulnerability is possible if the NX-OS features bash or guestshell are enabled. There is no workaround or mitigation for a local attacker with valid device credentials; however, customers are advised to follow best practices for account management as outlined in the Cisco Guide to Securing NX-OS Software Devices - Use Authentication, Authorization, and Accounting . Fixed Software o Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades. When considering software upgrades , customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page , to determine exposure and a complete upgrade solution. In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Customers Without Service Contracts Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c /en/us/support/web/tsd-cisco-worldwide-contacts.html Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade. Cisco NX-OS Software To help customers determine their exposure to vulnerabilities in Cisco NX-OS Software, Cisco provides the Cisco Software Checker to identify any Cisco Security Advisories that impact a specific Cisco NX-OS Software release and the earliest release that fixes the vulnerabilities that are described in each advisory ("First Fixed"). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified ("Combined First Fixed"). Customers can use the Cisco Software Checker to search advisories in the following ways: Choose the software, platform, and one or more releases Upload a .txt file that includes a list of specific releases Enter the output of the show version command After initiating a search, customers can customize the search to include all Cisco Security Advisories or one or more specific advisories. Customers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by choosing the Cisco NX-OS Software and platform and then entering a release-for example, 7.0(3)I7(5) for Cisco Nexus 3000 Series Switches or 14.0(1h) for Cisco NX-OS Software in ACI mode. By default, the Cisco Software Checker includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker and check the Medium check box in the drop-down list under Impact Rating when customizing a search. Cisco Nexus 3000 and 9000 Series Switches SMUs For Cisco Nexus 3000 and 9000 Series Switches, SMUs are available for Cisco NX-OS Software Release 9.3(6). Customers can download the following SMU from the Software Center on Cisco.com: nxos.CSCvw89875-n9k_ALL-1.0.0-9.3.6.lib32_n9000.rpm. For details about downloading and installing SMUs in Cisco NX-OS Software for these Cisco Nexus Switches, see the Performing Software Maintenance Upgrades section of the appropriate NX-OS system management configuration guide: Cisco Nexus 3000 Series Switches Cisco Nexus 9000 Series Switches Additional Resources For help determining the best Cisco NX-OS Software release for a Cisco Nexus Switch, see the following Recommended Releases documents. If a security advisory recommends a later release, Cisco recommends following the advisory guidance. Cisco MDS Series Switches Cisco Nexus 1000V for VMware Switch Cisco Nexus 3000 Series Switches Cisco Nexus 5500 Platform Switches Cisco Nexus 5600 Platform Switches Cisco Nexus 6000 Series Switches Cisco Nexus 7000 Series Switches Cisco Nexus 9000 Series Switches Cisco Nexus 9000 Series ACI-Mode Switches To determine the best release for Cisco UCS Software, see the Recommended Releases documents in the release notes for the device. Exploitation and Public Announcements o The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. Source o Cisco would like to thank an anonymous reporter for finding this vulnerability. Cisco Security Vulnerability Policy o To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy . This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco. Related to This Advisory o Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication URL o https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3000-9000-fileaction-QtLzDRy2 Revision History o +----------+---------------------------+----------+--------+--------------+ | Version | Description | Section | Status | Date | +----------+---------------------------+----------+--------+--------------+ | 1.0 | Initial public release. | - | Final | 2021-FEB-24 | +----------+---------------------------+----------+--------+--------------+ - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBYDdJD+NLKJtyKPYoAQiLlA//cZoU2s/WRVAg5X803sp3+qthwOGne+sK PjGhOUzrcRazk6A32+VDP+kR4UCZg+TJUxbs/6AgDyZSPGss4F3OcRkNL/fQe6fu iduZhTks/jkSGa2ZjPiG5U3l/5ufQnVIOrydHpFE1OYGjKxZi9klH0tGsl4Vxnid mUXJuCZf3ZWt1dkELgHrtoZ86YbpJdlFn95N/yk4DMi1FT3oHY6pl6omdWTwfLsU b+Y6U3ZfrRIHfFI7W9/+Rs+Gkpw92ZmgfYJAU2AJ2ID1raHiyfvIwLJpDYnMccmh RxZ7BX79hKlptj3UbWjyT7WJ+wx3kjIkd0pd7g7j3FvKdx44UhBammGCtD/byOOt v59tHm1KHKt3dH0O4Saw6lggfpzeB8CXXnSHsze2Tl1QdPpOMIMDbY0hWL6TMLwm /9fF1Z0R85AtbjTUuJ+ZhYRxZ/uDSLTioScLlauih2a2276TNOTabT9y+Mkptyux nw3BXrM9+RzReJ8cHWisGuV1upIawQ1Ab2Ywmcix5F1EP9U2JjKS0qeLxMboWrqS W1XrOFQF0V8uUzkN/qDVbX/TqRJtHZg8DdTELdhQJbU1wvc0Eks26ej00vwJWj2Z xHTG04g8dJnVi6DF12iZCEdpJxSszKAi6tkXQiDsOKulYHNqEYSVdG4nuZI7nxxv /ezfwQRebN8= =Bnnd -----END PGP SIGNATURE-----