QID 317300

Date Published: 2023-03-28

QID 317300: Cisco Unified Computing System (UCS) Fabric Interconnects Authentication Bypass Vulnerability (cisco-sa-elyfex-dos-gfvcByx)

A vulnerability in the CLI console login authentication of Cisco Nexus 9300-FX3 Series Fabric Extender (FEX) when used in UCS Fabric Interconnect deployments could allow an unauthenticated attacker with physical access to bypass authentication.

Affected Products:
UCS 6400 Series Fabric Interconnects
UCS 6500 Series Fabric Interconnects

QID Detection Logic(Authenticated):
It checks for vulnerable version of Cisco UCS using show version Command.
Note: This QID does not checks for the Nexus 9000 Series PID's when configured in FEX mode.

A successful exploit could allow the attacker to bypass authentication and execute a limited set of commands local to the FEX, which could cause a device reboot and denial of service (DoS) condition.

  • CVSS V3 rated as Medium - 4.6 severity.
  • CVSS V2 rated as Medium - 4.9 severity.
  • Solution

    Customers are advised to refer to cisco-sa-elyfex-dos-gfvcByx for more information.

    CVEs related to QID 317300

    Software Advisories
    Advisory ID Software Component Link
    cisco-sa-elyfex-dos-gfvcByx URL Logo sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-elyfex-dos-gfvcByx