Cisco ACI Multi-Site CloudSec Encryption Information Disclosure (cisco-sa-aci-cloudsec-enc-Vs5Wn2sX)

high Nessus Plugin ID 178417

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco NX-OS System Software in ACI Mode is affected by an information disclosure vulnerability. The vulnerability affects Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode of Multi-Site that are part of a Multi-Site topology and have the CloudSec encryption feature enabled. Due to an issue with the implementation of the ciphers that are used by the CloudSec encryption feature , an unauthenticated, remote attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption. Successful exploitation could allow the attacker to read or modify the traffic that is transmitted between the sites.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCwf02544

See Also

http://www.nessus.org/u?54db6797

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwf02544

Plugin Details

Severity: High

ID: 178417

File Name: cisco-sa-aci-cloudsec-enc-Vs5Wn2sX.nasl

Version: 1.1

Type: combined

Family: CISCO

Published: 7/18/2023

Updated: 7/19/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.1

Temporal Score: 5.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:N

CVSS Score Source: CVE-2023-20185

CVSS v3

Risk Factor: High

Base Score: 7.4

Temporal Score: 6.4

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device, Host/aci/system/chassis/summary

Exploit Ease: No known exploits are available

Patch Publication Date: 7/5/2023

Vulnerability Publication Date: 7/5/2023

Reference Information

CVE: CVE-2023-20185