First published: Thu Feb 23 2023(Updated: )
A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus 93180yc-fx3s Firmware | ||
Cisco Nexus 93180yc-fx3s | ||
Cisco Nexus 93180yc-fx3 Firmware | ||
Cisco Nexus 93180yc-fx3 | ||
Cisco Ucs Central Software | >=4.2<4.2\(2d\) | |
Cisco Ucs 6536 Firmware | ||
Cisco Ucs 6536 | ||
Cisco Ucs 64108 Firmware | ||
Cisco Ucs 64108 | ||
Cisco Ucs 6454 Firmware | ||
Cisco Ucs 6454 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-20012.
The severity level of CVE-2023-20012 is medium with a severity value of 4.6.
Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments is affected by CVE-2023-20012.
An unauthenticated attacker with physical access could bypass authentication using the vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments.
You can find more information about CVE-2023-20012 at the following link: [Cisco Security Advisory](https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-elyfex-dos-gfvcByx).