First published: Tue Sep 27 2022(Updated: )
On September 27, 2022, the following vulnerabilities affecting Cisco products were disclosed by Cert/CC as part of VU855201, titled L2 network security controls can be bypassed using VLAN 0 stacking and/or 802.3 headers: Exploitation of these vulnerabilities could allow an adjacent attacker to bypass configured first-hop security (FHS) features on the affected Cisco products. For more information about these vulnerabilities, see the Details section of this advisory. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-VU855201-J3z8CKTX
Credit: Etienne Champetier for reporting these vulnerabilities Cert/CC for the coordination.
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Products | =Cisco IOS XE Switches<CSCvz91291 | CSCvz91291 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Contains the following vulnerabilities)
The severity of cisco-sa-VU855201-J3z8CKTX is categorized as high due to the potential for network security controls to be bypassed.
To fix cisco-sa-VU855201-J3z8CKTX, update to the latest version of Cisco IOS XE Switches that addresses the vulnerabilities.
Cisco IOS XE Switches are the primary affected products outlined in cisco-sa-VU855201-J3z8CKTX.
Employing strict network segmentation and access controls can help mitigate the risks associated with cisco-sa-VU855201-J3z8CKTX.
Yes, a specific remedy is available with the fix indicated as CSCvz91291 in cisco-sa-VU855201-J3z8CKTX.