Vulnslist

find the latest Cisco vulnerabilities

Cisco Nexus 1000V Switch for VMware vSphere Secure Login Enhancements Denial of Service Vulnerability

cisco-sa-20200226-nexus-1000v-dos · High · Published · Updated

A vulnerability in the Secure Login Enhancements capability of Cisco Nexus 1000V Switch for VMware vSphere could allow an unauthenticated, remote attacker to cause an affected Nexus 1000V Virtual Supervisor Module (VSM) to become inaccessible to users through the CLI. The vulnerability is due to improper resource allocation during failed CLI login attempts when login parameters that are part of the Secure Login Enhancements capability are configured on an affected device. An attacker could exploit this vulnerability by performing a high amount of login attempts against the affected device. A successful exploit could cause the affected device to become inaccessible to other users, resulting in a denial of service (DoS) condition requiring a manual power cycle of the VSM to recover. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-nexus-1000v-dos This advisory is part of the February 2020 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication, which includes six Cisco Security Advisories that describe six vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: February 2020 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Workarounds

There are no workarounds that address this vulnerability.

Customers who cannot immediately apply a software fix may evaluate the possibility of disabling Secure Login Enhancements by removing the login parameters from the configuration until a software fix can be applied, and relying on an access control list (ACL) on the management interface (mgmt0) to restrict access to the device only from explicitly trusted source IP addresses.

Customers should first evaluate the impact of those configuration changes to the device and their security policy. Customers concerned about undesired or unexpected side effects should consult with their support organization before implementing any configuration change.

CVEsCVE-2020-3168
Cisco Bug IDsCSCvp26722
CVSS ScoreBase 7.5
Base 7.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco NX-OS Software

CSAF Product Statuses

Product Status Source CVE Rows
Cisco NX-OS Software known_affected cisco_csaf CVE-2020-3168 1

Related Products

Product CVE Evidence
Cisco Firepower Extensible Operating System (FXOS) CVE-2020-3168 Cisco OpenVuln
Cisco Nexus 1000V Switch CVE-2020-3168 Cisco OpenVuln
Cisco NX-OS Software CVE-2020-3168 Cisco OpenVuln
Cisco Nexus 1000V for KVM and Microsoft Hyper-V CVE-2020-3168 Cisco OpenVuln