Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-20012— Cisco Nexus 9300-FX3 Series Fabric Extender for UCS Fabric Interconnects Authentication Bypass Vulnerability

CVSS 5.3 · Medium EPSS 0.10% · P27
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-20012

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Cisco Nexus 9300-FX3 Series Fabric Extender for UCS Fabric Interconnects Authentication Bypass Vulnerability
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication. This vulnerability is due to the improper implementation of the password validation function. An attacker could exploit this vulnerability by logging in to the console port on an affected device. A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
认证机制不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco Nexus 9300-FX3 Series 授权问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco Nexus 9300-FX3 Series是美国思科(Cisco)公司的一系列交换机。 Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) 存在安全漏洞,该漏洞源于密码验证功能实现不当。攻击者利用该漏洞绕过身份验证,导致设备重启和拒绝服务情况。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
CiscoCisco Unified Computing System (Managed) n/a -

II. Public POCs for CVE-2023-20012

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-20012

登录查看更多情报信息。

Same Patch Batch · Cisco · 2023-02-23 · 6 CVEs total

CVE-2023-200118.8 HIGHCisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller Cros
CVE-2023-200897.4 HIGHCisco Nexus 9000 Series Fabric Switches in ACI Mode Link Layer Discovery Protocol Memory L
CVE-2023-200166.3 MEDIUMCisco FXOS Software and UCS Manager Software Configuration Backup Static Key Vulnerability
CVE-2023-200156.0 MEDIUMCisco Firepower 4100 Series, Firepower 9300 Security Appliances, and UCS Fabric Interconne
CVE-2023-200504.4 MEDIUMCisco NX-OS Software CLI Command Injection Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2023-20012

No comments yet


Leave a comment