First published: Wed Feb 24 2021(Updated: )
A vulnerability in the implementation of an internal file management service for Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode that are running Cisco NX-OS Software could allow an unauthenticated, remote attacker to create, delete, or overwrite arbitrary files with root privileges on the device. This vulnerability exists because TCP port 9075 is incorrectly configured to listen and respond to external connection requests. An attacker could exploit this vulnerability by sending crafted TCP packets to an IP address that is configured on a local interface on TCP port 9075. A successful exploit could allow the attacker to create, delete, or overwrite arbitrary files, including sensitive files that are related to the device configuration. For example, the attacker could add a user account without the device administrator knowing.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | =9.3\(5\) | |
Cisco Nx-os | =9.3\(6\) | |
Cisco Nexus 3000 | ||
Cisco Nexus 3100 | ||
Cisco Nexus 3100-z | ||
Cisco Nexus 3100v | ||
Cisco Nexus 3200 | ||
Cisco Nexus 3400 | ||
Cisco Nexus 3500 | ||
Cisco Nexus 3600 | ||
Cisco Nexus 9000v | ||
Cisco Nexus 92160yc-x | ||
Cisco Nexus 92300yc | ||
Cisco Nexus 92304qc | ||
Cisco Nexus 92348gc-x | ||
Cisco Nexus 9236c | ||
Cisco Nexus 9272q | ||
Cisco Nexus 93108tc-ex | ||
Cisco Nexus 93108tc-ex-24 | ||
Cisco Nexus 93108tc-fx | ||
Cisco Nexus 93108tc-fx-24 | ||
Cisco Nexus 93120tx | ||
Cisco Nexus 93128tx | ||
Cisco Nexus 9316d-gx | ||
Cisco Nexus 93180lc-ex | ||
Cisco Nexus 93180yc-ex | ||
Cisco Nexus 93180yc-ex-24 | ||
Cisco Nexus 93180yc-fx | ||
Cisco Nexus 93180yc-fx-24 | ||
Cisco Nexus 93180yc-fx3 | ||
Cisco Nexus 93180yc-fx3s | ||
Cisco Nexus 93216tc-fx2 | ||
Cisco Nexus 93240yc-fx2 | ||
Cisco Nexus 9332c | ||
Cisco Nexus 9332pq | ||
Cisco Nexus 93360yc-fx2 | ||
Cisco Nexus 9336c-fx2 | ||
Cisco Nexus 9336c-fx2-e | ||
Cisco Nexus 9336pq Aci Spine | ||
Cisco Nexus 9348gc-fxp | ||
Cisco Nexus 93600cd-gx | ||
Cisco Nexus 9364c | ||
Cisco Nexus 9364c-gx | ||
Cisco Nexus 9372px | ||
Cisco Nexus 9372px-e | ||
Cisco Nexus 9372tx | ||
Cisco Nexus 9372tx-e | ||
Cisco Nexus 9396px | ||
Cisco Nexus 9396tx | ||
Cisco Nexus 9508 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Nexus switch vulnerability is CVE-2021-1361.
CVE-2021-1361 has a severity rating of 9.1 (critical).
Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode are affected by CVE-2021-1361.
CVE-2021-1361 allows an unauthenticated, remote attacker to create, delete, or overwrite arbitrary files on the affected Cisco Nexus switches.
To fix the vulnerability CVE-2021-1361, Cisco has released software updates that address the issue. Refer to the Cisco Security Advisory for more information and to download the necessary updates.