First published: Wed Oct 21 2020(Updated: )
A vulnerability in the secure boot process of Cisco FXOS Software could allow an authenticated, local attacker to bypass the secure boot mechanisms. The vulnerability is due to insufficient protections of the secure boot process. An attacker could exploit this vulnerability by injecting code into a specific file that is then referenced during the device boot process. A successful exploit could allow the attacker to break the chain of trust and inject code into the boot process of the device which would be executed at each boot and maintain persistence across reboots. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fxos-sbbp-XTuPkYTn
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FXOS Software | =2.7<2.7.1.131=2.6<2.6.1.214>=Earlier than 2.2=2.2=2.3<=2.4<2.4.1.268 | 2.7.1.131 2.6.1.214 2.4.1.268 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is cisco-sa-fxos-sbbp-XTuPkYTn.
The severity of the vulnerability is medium.
The affected software is Cisco FXOS Software version 2.7.1.131, 2.6.1.214, and 2.4.1.268.
An attacker could exploit this vulnerability by injecting code into the secure boot process.
Yes, Cisco has provided the following fixed versions to address this vulnerability: 2.7.1.131, 2.6.1.214, and 2.4.1.268.