CyberSpecta Logo
VulnerabilitiesBy CyberSpecta

Cisco ACI Multi-Site CloudSec Encryption Vulnerability Exposes Data Center Switches

Share

Cisco has issued a security advisory warning about a high-severity vulnerability affecting specific data center switch models. The vulnerability, tracked as CVE-2023-20185 specifically targets the Cisco ACI Multi-Site CloudSec encryption feature on Cisco Nexus 9000 Series Fabric Switches. Attackers can exploit this flaw to tamper with encrypted traffic, potentially compromising data integrity and confidentiality.

Vulnerability Details:

The vulnerability impacts Cisco Nexus 9332C, 9364C, and 9500 spine switches operating in ACI mode, participating in a Multi-Site topology, and enabling the CloudSec encryption feature. Devices running firmware versions 14.0 and later are also susceptible. The flaw allows unauthenticated attackers with an on-path position between ACI sites to intercept intersite encrypted traffic and use cryptanalytic techniques to read or modify the data.

Risk and Impact:

The vulnerability exposes the confidentiality and integrity of data transmitted between ACI sites. An attacker exploiting this flaw could gain unauthorized access to sensitive information or manipulate the data for malicious purposes. However, Cisco has no evidence of active exploitation or public exploit code targeting this vulnerability.

Affected Products:

The vulnerability affects Cisco Nexus 9000 Series Fabric Switches in ACI mode running releases 14.0 and later if they are part of a Multi-Site topology and have the CloudSec encryption feature enabled. Cisco Nexus 9332C, 9364C, and 9500 spine switches equipped with a Cisco Nexus N9K-X9736C-FX Line Card are specifically vulnerable. To determine whether CloudSec encryption is in use in an ACI site, choose Infrastructure > Site Connectivity > Configure > Sites > site-name > Inter-Site Connectivity on the Cisco Nexus Dashboard Orchestrator (NDO) and check if CloudSec Encryption is marked Enabled.

Mitigation Steps:

Currently, Cisco has not released any software updates to address the vulnerability. To mitigate the risk, customers using affected switches are advised to disable the CloudSec encryption feature and seek guidance from their support organization for alternative solutions. Determining whether CloudSec encryption is enabled can be done through the Cisco Nexus Dashboard Orchestrator (NDO) or the appropriate command on the affected switch.

Conclusion:

The Cisco ACI Multi-Site CloudSec encryption vulnerability poses a significant risk to data center switch users. By exploiting this flaw, attackers could compromise the confidentiality and integrity of encrypted traffic between ACI sites. Although Cisco has not observed any active exploitation, affected organizations must take immediate action by disabling the vulnerable feature and exploring alternative options to ensure the security of their network infrastructure. Stay informed about future software updates from Cisco to address this vulnerability.

Related News

Privilege Escalation Vulnerabilities in Atera Software's Windows Installers

Privilege Escalation Vulnerabilities in Atera Software's Windows Installers

Privilege escalation attacks are a severe concern to organizations, as they can lead to unauthorized access and control over sensitive systems. Mandiant's red team recently discovered zero-day vulnerabilities in the Windows Installers of Atera remote monitoring and management software. These flaws, designated as CVE-2023-26077 and CVE-2023-26078, could potentially allow attackers to execute arbitrary code with [...]

Critical Vulnerabilities Found in Honeywell Experion Systems Pose Serious Threats to Industrial Infrastructure

Critical Vulnerabilities Found in Honeywell Experion Systems Pose Serious Threats to Industrial Infrastructure

Security researchers from Armis have recently uncovered nine critical vulnerabilities in Honeywell's Experion distributed control system (DCS) products. These vulnerabilities, if exploited, could allow hackers to gain unauthorized access, remotely run code, and alter the operation of the DCS controllers. The potential impact extends beyond business disruptions, as these vulnerabilities pose a risk to critical [...]

Threat Actors Forge Signatures on Kernel-Mode Drivers using Windows Loophole

Threat Actors Forge Signatures on Kernel-Mode Drivers using Windows Loophole

Researchers at Cisco Talos have uncovered a critical vulnerability in the Windows operating system that allows threat actors, primarily native Chinese speakers, to forge signatures on kernel-mode drivers. By exploiting this loophole, malicious actors can load unverified drivers with expired certificates, bypassing Windows' driver signature enforcement. This article delves into the technical details of the [...]