Cisco Releases Advisory for Exploited Vulnerability in NX-OS software
CLI in NX-OS software contains a command injection vulnerability CVE-2024-20399 that is being exploited in the wild
Summary
CLI in NX-OS software contains a command injection vulnerability CVE-2024-20399 that is being exploited in the wild
Affected platforms
The following platforms are known to be affected:
Threat details
Cisco Software Checker
Cisco have advocated the use of their Cisco Software Checker to search for Cisco Security Advisories that apply to specific software releases of the following products: Cisco ASA, FMC, FTD, FXOS, IOS, IOS XE, NX-OS and NX-OS in ACI Mode.
Introduction
Cisco has released a security advisory for a vulnerability in the command line interface (CLI) of the NX-OS software in Nexus series switches, which are modular and fixed port network switches designed for data centres. The command injection vulnerability known as CVE-2024-20399 has a CVSSv3 score of 6.0 and is rated at Medium by Cisco.
An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command, leading to arbitrary command execution on the underlying operating system with the privileges of root. This vulnerability is being exploited in the wild.
Exploitation of CVE-2024-20399 in the wild
Cisco Product Security Incident Response Team (PSIRT) became aware of attempted exploitation of this vulnerability in April 2024.
Remediation advice
Affected organisations are encouraged to read the Cisco Security Advisory cisco-sa-nxos-cmd-injection-xD9OhyOP and apply relevant security updates.
Definitive source of threat updates
Last edited: 2 July 2024 2:11 pm