Cisco Security Advisory - Cisco NX-OS Software NX-API Cross-Site Request Forgery Vulnerability

Started by Netwörkheäd, February 27, 2021, 06:10:05 AM

Previous topic - Next topic

Netwörkheäd

Cisco NX-OS Software NX-API Cross-Site Request Forgery Vulnerability

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack on an affected system.


This vulnerability is due to insufficient CSRF protections for the NX-API on an affected device. An attacker could exploit this vulnerability by persuading a user of the NX-API to follow a malicious link. A successful exploit could allow the attacker to perform arbitrary actions with the privilege level of the affected user. The attacker could view and modify the device configuration.


Note: The NX-API feature is disabled by default.


Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. 


This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-csrf-wRMzWL9z



This advisory is part of the February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.




     
         
Security Impact Rating:  High
   
   
       
CVE: CVE-2021-1227
Source: Cisco NX-OS Software NX-API Cross-Site Request Forgery Vulnerability
Let's not argue. Let's network!