A critical vulnerability has been identified in Cisco NX-OS Software's bootloader, making it possible to bypass image signature verification. This flaw compromises the secure boot process, potentially enabling unauthorized software to be executed on affected devices. The vulnerability results from insecure bootloader settings in Cisco NX-OS Software and requires either physical access or administrative credentials for exploitation. Attackers can bypass the verification process by executing specific bootloader commands, jeopardizing the integrity of network devices. The vulnerability affects Cisco products that rely on secure boot technology, including MDS 9000 Series Multilayer Switches, Nexus 3000, 7000, and 9000 Series Switches, as well as UCS 6400 and 6500 Series Fabric Interconnects. Only devices running a vulnerable BIOS version of Cisco NX-OS Software are at risk. Administrators can check their BIOS version using the show version command. To address the flaw, Cisco has released BIOS updates and recommends applying software updates immediately via the install all CLI command or by installing a Software Maintenance Upgrade (SMU) as specified in the Fixed Release table. There are no workarounds for this vulnerability, emphasizing the need for prompt updates. Cisco has made the updates available for free to all affected customers. While no public exploitation has been reported, the vulnerability, disclosed by Ferdinand Nölscher of Google Cloud Product Security Engineering, highlights the importance of maintaining robust security practices and ensuring up-to-date software in network infrastructures. Organizations using Cisco NX-OS Software should urgently assess their systems and apply the recommended patches to mitigate potential threats.
The Apache Software Foundation has issued a new security advisory detailing three vulnerabilities affecting Apache Kylin, a high-concurrency OLAP engine used widely in big data ana...
NVIDIA has released a critical security update to address several vulnerabilities discovered in its NVIDIA App software for Windows. These flaws, if exploited, could allow local at...
The security of the open-source supply chain was tested again when researchers from JFrog discovered a malicious PyPI package called SoopSocks (XRAY-725599). Ostensibly advertised ...