Vulnslist

find the latest Cisco vulnerabilities

Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Insecure Fabric Authentication Vulnerability

cisco-sa-20190501-aci-insecure-fabric · High · Published · Updated

A vulnerability in the Transport Layer Security (TLS) certificate validation functionality of Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to perform insecure TLS client authentication on an affected device. The vulnerability is due to insufficient TLS client certificate validations for certificates sent between the various components of an ACI fabric. An attacker who has possession of a certificate that is trusted by the Cisco Manufacturing CA and the corresponding private key could exploit this vulnerability by presenting a valid certificate while attempting to connect to the targeted device. An exploit could allow the attacker to gain full control of all other components within the ACI fabric of an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-insecure-fabric

Workarounds

There are no workarounds that address this vulnerability.

CVEsCVE-2019-1590
Cisco Bug IDsCSCvn09791
CVSS ScoreBase 8.1
Base 8.1 CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco NX-OS System Software in ACI Mode, Cisco NX-OS System Software in ACI Mode 12.2(2g)

Related Products

Product CVE Evidence
Cisco Nexus Dashboard CVE-2019-1590 Cisco OpenVuln
Cisco Nexus 9000 Series Switches CVE-2019-1590 Cisco OpenVuln
Cisco NX-OS Software CVE-2019-1590 Cisco OpenVuln
Cisco Catalyst PON Series Switches CVE-2019-1590 Cisco OpenVuln
Cisco NX-OS System Software in ACI Mode CVE-2019-1590 Cisco OpenVuln