Rewterz Threat Advisory – Multiple Intel Products Vulnerabilities
February 27, 2023Rewterz Threat Alert – Orcus RAT – Active IOCs
February 27, 2023Rewterz Threat Advisory – Multiple Intel Products Vulnerabilities
February 27, 2023Rewterz Threat Alert – Orcus RAT – Active IOCs
February 27, 2023Severity
High
Analysis Summary
CVE-2023-20011 CVSS:8.8
Cisco Application Policy Infrastructure Controller and Cisco Cloud Network Controller is vulnerable to cross-site request forgery, caused by improper validation of user-supplied input. By persuading an authenticated user to visit a malicious Web site, a remote attacker could send a malformed HTTP request to perform arbitrary actions with the privilege level of the affected user. An attacker could exploit this vulnerability to perform cross-site scripting attacks, Web cache poisoning, and other malicious activities.
CVE-2023-20089 CVSS:7.4
Cisco Nexus 9000 Series Fabric Switches is vulnerable to a denial of service, caused by incorrect error checking when parsing ingress LLDP packets. By sending a steady stream of crafted LLDP packets, a remote attacker could exploit this vulnerability to cause a denial of service.
CVE-2023-20012 CVSS:5.4
Cisco Nexus 9300-FX3 Series Fabric Extender for UCS Fabric Interconnects could allow a local attacker to bypass security restrictions, caused by the improper implementation of the password validation function. By logging in to the console port, an attacker could exploit this vulnerability to bypass authentication and execute a limited set of commands local to the FEX.
Impact
- Unauthorized Access
- Denial of Service
- Security Bypass
Indicators Of Compromise
CVE
- CVE-2023-20011
- CVE-2023-20089
- CVE-2023-20012
Affected Vendors
Cisco
Affected Products
- Cisco Cloud Application Policy Infrastructure Controller (Cloud APIC)
- Cisco Cloud Network Controller
- Cisco Nexus 9000 Series Fabric Switches in ACI mode
- Cisco Nexus 9300-FX3 Series FEX
Remediation
Refer to Cisco Security Advisory for patch, upgrade or suggested workaround information.