First published: Wed May 01 2019(Updated: )
A vulnerability in the Transport Layer Security (TLS) certificate validation functionality of Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, remote attacker to perform insecure TLS client authentication on an affected device. The vulnerability is due to insufficient TLS client certificate validations for certificates sent between the various components of an ACI fabric. An attacker who has possession of a certificate that is trusted by the Cisco Manufacturing CA and the corresponding private key could exploit this vulnerability by presenting a valid certificate while attempting to connect to the targeted device. An exploit could allow the attacker to gain full control of all other components within the ACI fabric of an affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190501-aci-insecure-fabric
Credit: Costin Enache with Detack GmbH.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus 9000 Series Application Centric Infrastructure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-20190501-aci-insecure-fabric vulnerability has a high severity rating due to the potential for unauthenticated remote access.
To fix cisco-sa-20190501-aci-insecure-fabric, update the affected Cisco Nexus 9000 Series ACI Mode Switch Software to the latest version that addresses this vulnerability.
cisco-sa-20190501-aci-insecure-fabric allows an attacker to exploit the TLS certificate validation and perform insecure TLS client authentication.
The systems affected by cisco-sa-20190501-aci-insecure-fabric are the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software.
No, authentication is not required to exploit cisco-sa-20190501-aci-insecure-fabric, making it particularly critical to address.