• About
  • Advertise
  • Careers
  • Contact
  • About
Sunday, December 14, 2025
No Result
View All Result
NEWSLETTER
iotarizona
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars
No Result
View All Result
iotarizona
No Result
View All Result
Home Tech

Cisco warns of Nexus switch security weakness

in Tech
Cisco warns of Nexus switch security weakness
0
SHARES
30
VIEWS
Share on FacebookShare on Twitter

Cisco is telling customers of its Nexus core data-center switches to fix or work around a vulnerability that could leave the boxes open to a denial of service attack.

The vulnerability, found in the Nexus NX-OS software gets a 8.6 score out of 10 on the Common Vulnerability Scoring System, making it a “High” risk problem.

Cisco said the vulnerability is due to an affected device unexpectedly decapsulating and processing IP-in-IP packets that are destined to a locally configured IP address. IP in IP is a tunneling protocol that wraps an IP packet within another IP packet.

“A successful exploit could cause the affected device to unexpectedly decapsulate the IP-in-IP packet and forward the inner IP packet. This may result in IP packets bypassing input access-control lists (ACLs) configured on the affected device or other security boundaries defined elsewhere in the network,” Cisco stated. “Under certain conditions, an exploit could cause the network stack process to crash and restart multiple times, leading to a reload of the affected device and a DoS condition.”

The vulnerability impacts a variety of Nexus switches from the Nexus 1000 Virtual Edge for VMware vSphere to the Nexus 9000 Series.

Cisco said a workaround is to configure infrastructure access-control lists (iACLs) to let only required management and control-plane traffic to reach the affected device, as recommended in the Cisco Guide to Securing NX-OS Software Devices.

“Customers may also consider explicitly denying all IP packets with protocol number 4 (corresponding to IP-in-IP packets) as part of their iACLs, if no legitimate IP-in-IP traffic is used in their network. A customized control-plane-policing (CoPP) policy may also be used to drop IP-in-IP traffic that is destined to an affected device; however, support for CoPP customization varies across different Nexus platforms and software releases.”

Customers are advised to contact their support organization for assistance evaluating the feasibility of a workaround and with implementing one on an affected device, Cisco stated. Cisco also said the Cisco Software Checker identifies Cisco Security Advisories that affect specific Cisco NX-OS Software releases and names the earliest release that fixes vulnerabilities that are described in each advisory, called “First Fixed.”

In addition the company said it has released free software updates that address the vulnerability.

Join the Network World communities on Facebook and LinkedIn to comment on topics that are top of mind.

Copyright © 2020 IDG Communications, Inc.

Download Premium WordPress Themes Free
Free Download WordPress Themes
Download WordPress Themes Free
Download Best WordPress Themes Free Download
online free course
download intex firmware
Download WordPress Themes Free
download udemy paid course for free
ADVERTISEMENT
Next Post
IT skills to master for a better post-pandemic job

IT skills to master for a better post-pandemic job

Recommended

Why does Mellanox have four potential suitors?

Why does Mellanox have four potential suitors?

Network operations: A new role for AI and ML

Network operations: A new role for AI and ML

Facebook Twitter Youtube RSS

Newsletter

Subscribe our Newsletter for latest updates.

Loading

Category

  • AI
  • Analysis
  • Connected Cars
  • Connected Vehicles
  • Data & Analytics
  • Development
  • Enterprise
  • Healthcare
  • IIoT
  • IoT
  • Manufacturing
  • News
  • Oil & Gas
  • Security
  • Smart Cities
  • Smart Homes
  • Standards
  • Tech
  • Uncategorized
  • Wearables

About Us

Advance IOT information site of Arizona, USA.

© 2019-24 iotarizona.com.

No Result
View All Result
  • Home
  • Tech
  • IoT
  • Development
  • Enterprise
  • Data & Analytics
  • Smart Cities
  • AI
  • IIoT
  • Manufacturing
  • Connected Cars

© 2019-24 iotarizona.com.

Login to your account below

Forgotten Password?

Fill the forms bellow to register

All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In