First published: Wed Dec 04 2024(Updated: )
A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification. This vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software.
Credit: psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-20397 has a critical severity rating due to its potential for allowing unauthorized access to device functionalities.
To mitigate CVE-2024-20397, ensure that only authorized personnel have physical access to the affected devices and apply any available patches from Cisco.
CVE-2024-20397 affects any Cisco NX-OS Software that has not been updated to address this vulnerability.
CVE-2024-20397 could be exploited by an unauthenticated attacker with physical access or an authenticated local attacker with administrative rights.
Exploitation of CVE-2024-20397 could lead to the compromise of critical system integrity by allowing bypassing of signature verification on NX-OS images.