Cisco released a security updates with fixes for several product including Cisco Nexus 9000 Series Fabric Switches that affected by critical SSH key vulnerability that allow remote attackers gain access to the affected system.
A Critical Vulnerability (CVE-2019-1804) in SSH key pair for the software’s Secure Shell (SSH) key management function that allows attacks to discover the pairing and connect to a vulnerable Nexus 9000 Series device remotely.
This bug leaks to an attacker could exploit this vulnerability by opening an SSH connection via IPv6 to a targeted device using the extracted key materials.
Additionally Cisco patched 22 high-severity flaws and 18 medium-severity flaws that affected various other Cisco products.
Another high severity vulnerability (CVE-2019-1803) that affected Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an authenticated, local attacker with administrator rights to gain elevated privileges.
A command infection vulnerability (CVE-2019-1816) that affected Cisco Web Security Appliance (WSA) let local attacker to exploit the bug and elevate privileges to root.
“Multiple vulnerabilities in the Server Message Block (SMB) Protocol preprocessor detection engine for Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition.”
Download Free E-book to learn about complete Enterprise Security Implementation & Mitigation Steps – Download Free-Ebook Here.
A Complete List of Vulnerabilities that Patched by Cisco
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Default SSH Key Vulnerability |
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Denial of Service Vulnerability |
Cisco Firepower Threat Defense Software TCP Ingress Handler Denial of Service Vulnerability |
Cisco Firepower Threat Defense Software SMB Protocol Preprocessor Detection Engine Denial of Service Vulnerabilities |
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Low-Entropy Keys Vulnerability |
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software WebVPN Denial of Service Vulnerability |
Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software TCP Timer Handling Denial of Service Vulnerability |
Cisco Firepower Threat Defense Software Packet Processing Denial of Service Vulnerability |
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software VPN SAML Authentication Bypass Vulnerability |
Cisco Adaptive Security Appliance Software and Cisco Firepower Threat Defense Software MOBIKE Denial of Service Vulnerability |
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Root Privilege Escalation Vulnerability |
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software Lightweight Directory Access Protocol Denial of Service Vulnerability |
Cisco Adaptive Security Appliance Software and Firepower Threat Defense Software TCP Proxy Denial of Service Vulnerability |
Cisco Adaptive Security Appliance and Firepower Threat Defense Software Layer 2 Filtering Bypass Vulnerability |
Cisco Adaptive Security Appliance and Firepower Threat Defense Software WebVPN Cross-Site Scripting Vulnerabilities |
Cisco Web Security Appliance Privilege Escalation Vulnerability |
Cisco Web Security Appliance Malformed Request Denial of Service Vulnerability |
Cisco Umbrella Dashboard Session Management Vulnerability |
Cisco Small Business Switches Secure Shell Certificate Authentication Bypass Vulnerability |
Cisco Small Business RV320 and RV325 Routers Session Hijacking Vulnerability |
Cisco IP Phone 7800 Series and 8800 Series Session Initiation Protocol XML Denial of Service Vulnerability |
Cisco Adaptive Security Appliance Software IPsec Denial of Service Vulnerability |
Cisco Adaptive Security Appliance Software Cross-Site Request Forgery Vulnerability |
Cisco Application Policy Infrastructure Controller Privilege Escalation Vulnerability |
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Insecure Fabric Authentication Vulnerability |
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Privilege Escalation Vulnerability |
Cisco Adaptive Security Appliance Software Privilege Escalation Vulnerability |
Cisco Adaptive Security Appliance Software VPN Denial of Service Vulnerability |
Cisco Prime Network Registrar Cross-Site Scripting Vulnerability |
Cisco Prime Collaboration Assurance Cross-Site Scripting Vulnerability |
Cisco HyperFlex HX-Series Web-Based Management Interface Cross-Site Request Forgery Vulnerability |
Cisco Firepower Threat Defense Software Command Injection Vulnerability |
Cisco Firepower Threat Defense Software Command Injection Vulnerability |
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Symbolic Link Path Traversal Vulnerability |
Cisco Expressway Series Directory Traversal Vulnerability |
Cisco Email Security Appliance Filter Bypass Vulnerability |
Cisco Application Policy Infrastructure Controller Web-Based Management Interface Cross-Site Scripting Vulnerability |
Cisco Application Policy Infrastructure Controller Web-Based Management Interface Usage Information Disclosure Vulnerability |
Cisco Application Policy Infrastructure Controller Recoverable Encryption Key Vulnerability |
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Unmeasured Boot Vulnerability |
Cisco Nexus 9000 Series Fabric Switches Application Centric Infrastructure Mode Filter Query Information Disclosure Vulnerability |
Cisco advised users to apply these patches immediately to keep the network safe and secure.
To read the original article:
https://gbhackers.com/critical-ssh-key-vulnerability-cisco-switches/