Cisco has published advisory for three high severity and one medium severity vulnerability. Successful exploitation of the vulnerabilities could take over the vulnerable Cisco appliances. The flaws CVE-2022-20650 with a base score of 8.8 is the most critical vulnerability among the four, which allows an authenticated, remote attacker to execute arbitrary commands with root privileges. We recommend all the Cisco Switch owners to read this post that tells how to fix CVE-2022-20650- the new Remote Code Execution RCE vulnerability in Cisco Switches.
This is the most critical vulnerability on the list. This vulnerability allows authenticated remote attackers to execute arbitrary commands with root privileges. The flaw is due to improper validation of user input data sent to the NX-API in Cisco NX-OS Software. This is an easily exploitable flaw. Attackers can exploit the flaw just by sending a crafted HTTP POST request to the NX-API of an affected Cisco Switch.
The flaw affects these Switch models running these vulnerable Cisco NX-OS Software with enabled NX-API feature.
Nexus 3000 Series Switches (CSCvz80191)
Nexus 5500 Platform Switches (CSCvz81047)
Nexus 5600 Platform Switches (CSCvz81047)
Nexus 6000 Series Switches (CSCvz81047)
Nexus 9000 Series Switches in standalone NX-OS mode (CSCvz80191)
Cisco clearly says that these models are safe and not affected by the CVE-2022-20650 flaw. Owners of these models can ignore the vulnerability.
Firepower 1000 Series
Firepower 2100 Series
Firepower 4100 Series
Firepower 9300 Security Appliances
MDS 9000 Series Multilayer Switches
Nexus 1000 Virtual Edge for VMware vSphere
Nexus 1000V Switch for Microsoft Hyper-V
Nexus 1000V Switch for VMware vSphere
Nexus 7000 Series Switches
Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode
UCS 6200 Series Fabric Interconnects
UCS 6300 Series Fabric Interconnects
UCS 6400 Series Fabric Interconnects
Since the CVE-2022-20650 vulnerability is in the NX-API feature of Cisco NX-OS Software, the best and quick solution is to disable the NX-API on the devices. We recommend all the users of the affected devices update the Cisco NS-OS to the latest available version as Cisco has acknowledged the vulnerability by releasing the free software updates.
NX-API Feature is enabled by default for local access and disabled by default for remote HTTP access on all the devices. In case you want to check the status of NX-API Feature in the Cisco Switches, just run this simple command show feature | include nxapi on the command line interface.
nxos# show feature | include nxapi
nxapi 1 enabled
feature nxapi | Enables NX-API. |
no feature nxapi | Disables NX-API. |
nxapi {http | https} port port | Specifies a port. |
no nxapi {http | https} | Disables HTTP/HTTPS. |
show nxapi | Displays port and certificate information. |
Please find the full list of NX-API commands with configuration examples here.
We hope this post would help you know How to Fix CVE-2022-20650- The new RCE Vulnerability in Cisco Switches. Thanks for reading this threat post. Please share this post and help to secure the digital world. Visit our social media page on Facebook, LinkedIn, Twitter, Telegram, Tumblr, & Medium and subscribe to receive updates like this.
You may also like these articles:
How To Fix CVE-2022-20623- A Denial Of Service Vulnerability In Cisco Nexus 9000 Series Switches
How To Fix CVE-2022-20857- An Arbitrary Command Execution Vulnerability In Cisco Nexus Dashboard
How To Fix CVE-2022-20798- An Authentication Bypass Vulnerability In Cisco ESA And Cisco SMA
How to Fix Cve-2022-20842, a Remote Code Execution Vulnerability in Cisco RV Series Routers
What Is Remote Code Execution? How To Prevent Remote Code Execution?
Arun KL is a cybersecurity professional with 15+ years of experience in IT infrastructure, cloud security, vulnerability management, Penetration Testing, security operations, and incident response. He is adept at designing and implementing robust security solutions to safeguard systems and data. Arun holds multiple industry certifications including CCNA, CCNA Security, RHCE, CEH, and AWS Security.
“Knowledge Arsenal: Empowering Your Security Journey through Continuous Learning”
"Cybersecurity All-in-One For Dummies" offers a comprehensive guide to securing personal and business digital assets from cyber threats, with actionable insights from industry experts.
BurpGPT is a cutting-edge Burp Suite extension that harnesses the power of OpenAI's language models to revolutionize web application security testing. With customizable prompts and advanced AI capabilities, BurpGPT enables security professionals to uncover bespoke vulnerabilities, streamline assessments, and stay ahead of evolving threats.
PentestGPT, developed by Gelei Deng and team, revolutionizes penetration testing by harnessing AI power. Leveraging OpenAI's GPT-4, it automates and streamlines the process, making it efficient and accessible. With advanced features and interactive guidance, PentestGPT empowers testers to identify vulnerabilities effectively, representing a significant leap in cybersecurity.
Tenable BurpGPT is a powerful Burp Suite extension that leverages OpenAI's advanced language models to analyze HTTP traffic and identify potential security risks. By automating vulnerability detection and providing AI-generated insights, BurpGPT dramatically reduces manual testing efforts for security researchers, developers, and pentesters.
Microsoft Security Copilot is a revolutionary AI-powered security solution that empowers cybersecurity professionals to identify and address potential breaches effectively. By harnessing advanced technologies like OpenAI's GPT-4 and Microsoft's extensive threat intelligence, Security Copilot streamlines threat detection and response, enabling defenders to operate at machine speed and scale.