Security Issue Alert

Cisco Nexus 1000V Series Switches Software Upgrade Virtual Security Gateway Issues

 
Threat Type:CWE: Design Error
IntelliShield ID:27344
Version:1
First Published:2012 November 07 11:08 GMT
Last Published:2012 November 07 16:08 GMT
Port: Not available
Urgency:Unlikely Use
Credibility:Confirmed
Severity:Mild Damage
 
Version Summary:Cisco Nexus 1000V Series Switches Virtual Ethernet Modules contain an issue that could allow Ethernet traffic to bypass the Cisco Virtual Security Gateway. Updates are not available.
 
 
Description
Cisco Nexus 1000V Series Switches Virtual Ethernet Modules (VEM) contain an issue that could allow traffic to bypass the Cisco Virtual Security Gateway (VSG).

The issue is due to a bug when handling VSG licenses during an in-service upgrade of the affected software to Software Release 4.2(1)SV1(5.2) from Software Release 4.2(1)SV1(5.1a) or prior. The bug can result in a state in which the VEM is in unlicensed mode for VSG even when the device is configured with permanent VSG licenses and the Virtual Supervisor Module (VSM) continues to show it as licensed. As a result of the unlicensed mode for VSG, all the virtual Ethernet ports on the VEM of the affected device may stay in No-Policy pass-through mode; virtual machines (VM) are not firewalled and traffic is not passed through the VSG.

An unauthenticated, remote attacker could exploit this issue by attempting to convince an administrator to initiate a valid in-service software upgrade to Software Release 4.2(1)SV1(5.2). A successful exploit could allow the attacker to bypass the VSG and may be used by the attacker as a precursor to future attacks.

Cisco has confirmed this issue in a Cisco Security Response; however software updates are not yet available.

 
Patches/Software
Cisco released a security response to address Cisco bug ID CSCud01427 at the following link: cisco-sr-20121107-n1k.

Cisco customers with active contracts can obtain updates through the Software Center at the following link: Cisco. Cisco customers without contracts can obtain upgrades by contacting the Cisco Technical Assistance Center at 1-800-553-2447 or 1-408-526-7209 or via e-mail at tac@cisco.com.
 
Impact
An unauthenticated, remote attacker could exploit this issue to bypass the VSG, which the attacker may use as a precursor to future attacks.
 
Safeguards
Administrators are advised to contact the vendor regarding the future availability of Software Release 4.2(1)SV1(5.2a).

Administrators are advised to restrict access to affected systems.

Administrators are advised to monitor critical systems.

Administrators are advised to review the workaround procedures detailed in the Cisco Security Response.
 
Alert History
 
Initial Release


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
CiscoCisco NX-OS Software 4.2 (1)SV1(5.2)

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield