You are on page 1of 5

Threat

Intelligence

Advisory
Cisco: Multiple CVEs

Cisco Products Vulnerabilities


Threat Intelligence Advisory - 64859

Multiple vulnerabilities in Cisco products have been found. Some of these vulnerabilities could
be used by a remote attacker to cause a denial of service or security bypass on the targeted
system.

Privilege Escalation
Remote Code Execution
Information Theft
Denial Of Service

Cisco NX-OS Software


Cisco FXOS Software
Cisco UCS 6400 Series Fabric Interconnects
Cisco UCS 6500 Series Fabric Interconnects
Cisco Nexus 3000 Series Switches
Cisco Nexus 9000 Series Switches

CVE Number(s) Description Published CVSS Score

CVE-2024-20294 When some fields in an LLDP 2024-02-28 6.6


frame are handled incorrectly
the Cisco FXOS and NX-OS
software is susceptible to a
denial of service attack. A
remote attacker might leverage
this issue to crash the LLDP
service by sending a specially
constructed LLDP packet.
Threat Intelligence Advisory - 64859

CVE-2024-20321 A bug in the implementation of 2024-02-28 8.6


the External Border Gateway
Protocol eBGP could result in a
denial of service attack on the
Cisco NX-OS software. This
vulnerability could be used by a
remote attacker to force the
termination of eBGP neighbor
sessions by providing huge
volumes of network traffic with
specific characteristics.

CVE-2024-20267 When processing an incoming 2024-02-28 8.6


MPLS frame improper error
checking leaves the Cisco NX-
OS software open to a denial of
service attack. A remote attacker
might leverage this vulnerability
to send a specially constructed
IPv6 packet and cause a denial
of service.

CVE-2024-20344 Insufficient rate-limiting of TCP 2024-02-28 5.3


connections makes the Cisco
UCS 6400 and 6500 Series
Fabric Interconnects susceptible
to a denial of service attack. An
exploit for this issue could cause
the Device Console UI process
to fail by flooding the network
with TCP traffic.
Threat Intelligence Advisory - 64859

CVE-2024-20291 When configuration 2024-02-28 5.8


modifications are made to port
channel member ports
erroneous hardware
programming takes place which
can lead to security constraints
that a remote attacker could
circumvent on Cisco Nexus 3000
and 9000 Series Switches. An
attacker could use this
vulnerability to get access to
network resources by submitting
a request that has been carefully
constructed.
Threat Intelligence Advisory - 64859

CVEs Patch and info link:


https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-
nxos-ebgp-dos-L3QCwVJ

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv6-
mpls-dos-R9ycXkwM

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-
ucsfi-imm-syn-p6kZTDQC

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-
nxos-po-acl-TkyePgvL

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-
nxos-lldp-dos-z7PncTgt

Update the aforementioned Vulnerability as soon as possible on your end.

Update all programmes Prioritize patches for CVEs that are already known to be exploited or
that would be available to the greatest number of potential adversaries as soon as a patch is
released (such as internet-facing systems)

You might also like