First published: Thu Nov 30 2017(Updated: )
A vulnerability in the Open Agent Container (OAC) feature of Cisco Nexus Series Switches could allow an unauthenticated, local attacker to read and send packets outside the scope of the OAC. The vulnerability is due to insufficient internal security measures in the OAC feature. An attacker could exploit this vulnerability by crafting specific packets for communication on the device-internal network. A successful exploit could allow the attacker to run code on the underlying host operating system. OAC is not enabled by default. For a device to be vulnerable, an administrator would need to install and activate this feature. This vulnerability affects the following Cisco Nexus Series Switches: Nexus 2000 Series Fabric Extenders, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches. Cisco Bug IDs: CSCve53542, CSCvf36621.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =7.0\(0\)hsk\(0.357\) | |
Cisco NX-OS | =8.1\(1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12342 has been rated as a critical vulnerability due to its potential to allow unauthenticated local attackers to exploit the Cisco Nexus Series Switches.
To remediate CVE-2017-12342, it is recommended to upgrade the affected Cisco NX-OS versions to the latest patches provided by Cisco.
CVE-2017-12342 affects Cisco Nexus Series Switches running NX-OS versions 7.0(0)hsk(0.357) and 8.1(1).
An unauthenticated local attacker with access to the affected system can exploit CVE-2017-12342.
Exploitation of CVE-2017-12342 may allow attackers to read and send packets beyond the expected scope of the Open Agent Container.