First published: Wed Sep 25 2019(Updated: )
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-vman
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS Software | ||
Cisco NX-OS Software | =7.2<7.1(5(N1(1b)=7.1<7.1(5(N1(1b)=7.0<7.1(5(N1(1b) | 7.1(5(N1(1b) 7.1(5(N1(1b) 7.1(5(N1(1b) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Cisco SA 20190925 vman is a vulnerability in Cisco NX-OS and IOS XE Software that allows an attacker to bypass the image signature verification of virtual service containers.
The severity of the Cisco SA 20190925 vman vulnerability is medium with a CVSS score of 6.7.
The Cisco SA 20190925 vman vulnerability affects Cisco NX-OS Software versions 7.0, 7.1, and 7.2.
There are no workarounds available to address the Cisco SA 20190925 vman vulnerability.
You can find more information about the Cisco SA 20190925 vman vulnerability in the Cisco Security Advisory at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-vman