First published: Wed Dec 04 2024(Updated: )
A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification. This vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software.Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-image-sig-bypas-pQDRQvjL
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-nxos-image-sig-bypas-pQDRQvjL is high due to the potential for unauthorized access to system functionality.
Cisco NX-OS Software is the affected system by cisco-sa-nxos-image-sig-bypas-pQDRQvjL.
To fix cisco-sa-nxos-image-sig-bypas-pQDRQvjL, ensure you update to the latest version of Cisco NX-OS that addresses the vulnerability.
No, an attacker must have physical access to the device or be an authenticated local user to exploit cisco-sa-nxos-image-sig-bypas-pQDRQvjL.
An attacker could potentially bypass NX-OS image signature verification, allowing unauthorized manipulation of the operating system.