Data: CASIE
Negative Trigger
fixes
for
34
flaws
in
its
software
,
including
24
that
affect
Vulnerability-related.DiscoverVulnerability
its
FXOS
software
for
Firepower
firewalls
and
NX-OS
software
for
Nexus
switches
.
Cisco
's
June
updates
include
fixes
for
five
critical
arbitrary
code
execution
vulnerabilities
affecting
Vulnerability-related.DiscoverVulnerability
FXOS
and
NX-OS
and
19
high-rated
flaws
affecting
Vulnerability-related.DiscoverVulnerability
the
software
.
Four
of
the
critical
flaws
affect
Vulnerability-related.DiscoverVulnerability
FXOS
and
NX-OS
Cisco
Fabric
Services
,
while
the
fifth
one
affects
Vulnerability-related.DiscoverVulnerability
the
NX-API
feature
of
NX-OS
.
All
have
a
CVSS
v3
score
of
9.8
out
of
a
maximum
of
10
.
Cisco
Fabric
Services
facilitate
distribution
and
synchronization
of
configuration
data
between
Cisco
devices
on
the
same
network
.
Some
of
the
flaws
allow
an
unauthenticated
,
remote
attack
to
execute
arbitrary
code
and
one
allows
an
attacker
to
do
so
as
root
.
Multiple
switches
are vulnerable
Vulnerability-related.DiscoverVulnerability
if
they
've
been
configured
to
use
Cisco
Fabric
Services
,
including
its
Nexus
2000
series
through
to
Nexus
9000
series
switches
,
as
well
as
Cisco
's
Firepower
4100
Series
Next-Gen
Firewalls
and
other
hardware
.
The
insufficient
input
validation
may
occur
when
FXOS
and
NX-OS
process
Cisco
Fabric
Services
packets
received
during
distribution
and
synchronization
.
There
are
various
ways
to
exploit
each
of
the
flaws
,
depending
on
what
Cisco
Fabric
Services
distribution
types
have
been
configured
.
For
example
,
if
Fibre
Channel
ports
are
configured
as
a
distribution
type
for
a
device
,
the
attack
could
occur
via
Fibre
Channel
over
Ethernet
(
FCoE
)
or
Fibre
Channel
over
IP
(
FCIP
)
.
Cisco
has already rolled out
Vulnerability-related.PatchVulnerability
fixes
in
some
releases
of
FXOS
and
NX-OS
.
Cisco
posted
a
blog
this
week
explaining
why
it
often
fixes
Vulnerability-related.PatchVulnerability
bugs
in
IOS
and
NX-OS
releases
before
disclosing
Vulnerability-related.DiscoverVulnerability
them
in
an
advisory
.
It
's
a
practice
that
appears
to
cause
confusion
for
customers
wondering
why
it
has
n't
told
them
fixed
code
has been available
Vulnerability-related.PatchVulnerability
for
several
months
before
it
discloses
Vulnerability-related.DiscoverVulnerability
them
.
Cisco
's
answer
is
that
some
flaws
affect
Vulnerability-related.DiscoverVulnerability
more
than
50
versions
of
its
software
.
``
There
have
been
some
questions
as
to
why
creating
Vulnerability-related.PatchVulnerability
fixes
and
releasing
Vulnerability-related.PatchVulnerability
updates
can
take
several
weeks
,
or
sometimes
even
months
,
before
an
advisory
is
published
,
''
Cisco
's
Customer
Assurance
Security
Programs
team
wrote
.
``
In
some
cases
,
there
is
a
large
number
of
supported
software
versions
to
be
updated
.
The
number
of
affected
versions
that
will be updated
Vulnerability-related.PatchVulnerability
can
range
from
single
digits
to
nearly
50
or
more
.
We
are committed to issuing
Vulnerability-related.PatchVulnerability
fixes
for
every
one
of
those
supported
versions
.
''
``
If
we
disclosed
Vulnerability-related.DiscoverVulnerability
the
vulnerability
after
only
fixing
Vulnerability-related.PatchVulnerability
one
release
,
we
would
unnecessarily
expose
all
customers
running
Vulnerability-related.PatchVulnerability
other
releases
to
potential
exploitation
once
details
about
the
attack
itself
became
public
.
''
There
are
also
10
medium-severity
flaws
,
including
one
that
affects
Vulnerability-related.DiscoverVulnerability
some
WebEx
endpoints
due
to
an
already
disclosed
flaw
in
Nvidia
's
Tegra
TX1
chips
.