First published: Wed Oct 14 2020(Updated: )
An internal security review has identified an unauthenticated remote code execution vulnerability in Cloud Networking Operating System (CNOS)’ optional REST API management interface. This interface is disabled by default and not vulnerable unless enabled. When enabled, it is only vulnerable where attached to a VRF and as allowed by defined ACLs. Lenovo strongly recommends upgrading to a non-vulnerable CNOS release. Where not possible, Lenovo recommends disabling the REST API management interface or restricting access to the management VRF and further limiting access to authorized management stations via ACL.
Credit: psirt@lenovo.com
Affected Software | Affected Version | How to fix |
---|---|---|
Lenovo Cloud Networking Operating System | <10.10.6.0 | |
Lenovo Rackswitch G8272 | ||
Lenovo Rackswitch G8296 | ||
Lenovo Rackswitch G8332 | ||
Lenovo Rackswitch Ne0152t | ||
Lenovo Rackswitch Ne10032 | ||
Lenovo Rackswitch Ne1032 | ||
Lenovo Rackswitch Ne1032t | ||
Lenovo Rackswitch Ne1072t | ||
Lenovo Rackswitch Ne2572 |
Upgrade to the CNOS version 10.10.6.0 or later.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.