First Impressions of Nitrux Linux: An Immutable OS

https://video.fosshq.org/videos/watch/5027ab90-bdd2-46bc-ad16-22c42ccf5a0c

First Impressions of Nitrux Linux: An Immutable OS

PeerTube

First Impressions of Nitrux Linux: An Immutable OS

https://tux-edu.tv/videos/watch/bb0e644d-dd18-4b00-9302-d0c2f1835966

First Impressions of Nitrux Linux: An Immutable OS

PeerTube
Is there any way to get a Cisco NXOS update (e.g., nxos64-cs-10.3.5.M. bin and guestshell-10.3.5.M.ova) for a used Nexus C90108TC-EX switch without spending a fortune? It appears that a service contract costs over $1000/year, and I'm not sure they would even sell me one for the used switch, but all I want is a one-off software update.
#cisco #nexus #nxos #upgrade

Cisco warns of NX-OS Zero-Day Exploited to deploy custom Malware.

Cisco has patched an NX-OS zero-day exploited in April attacks to install previously unknown malware as root on vulnerable switches. Admins can use the Cisco Software Checker page to determine whether devices on their network are exposed to attacks targeting the CVE-2024-20399 vulnerability.

https://sec.cloudapps.cisco.com/security/center/softwarechecker.x

#cisco #nexus #nxos #it #security #privacy #tech #engineering #news

Cisco Software Checker

A critical zero-day vulnerability, known as CVE-2024-20399, exists in the Command Line Interface (CLI) of Cisco NX-OS Software. This flaw allows attackers to run arbitrary commands as root on affected devices, posing a severe risk to network security, especially for those using Cisco's Nexus and MDS series switches. The issue stems from inadequate validation of arguments given to specific CLI commands. An attacker with admin rights can exploit this by inputting specially crafted arguments during a CLI command, gaining root access and the ability to execute any commands.

The Cisco Product Security Incident Response Team (PSIRT) discovered this vulnerability being actively exploited in April 2024, linking the attacks to a Chinese state-sponsored group called Velvet Ant. This group deployed malware through the flaw, enabling remote control, file uploads, and hidden malicious activities. Cisco has issued software updates to fix this issue, but there are no temporary solutions. It's crucial for administrators to install these updates immediately and frequently update admin passwords to reduce risks. Cisco offers a Software Checker tool to help identify affected software and the necessary updates. Organizations using affected Cisco products should prioritize patching and closely watch their networks for suspicious activity.

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP

https://sec.cloudapps.cisco.com/security/center/softwarechecker.x

#cybersecurity #cisco #vulnerability #zeroday #cve #cli #nxos #nexus #mds #switch #root #psirt #velvetant #software #patch #update

Cisco Security Advisory: Cisco NX-OS Software CLI Command Injection Vulnerability

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root. Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP

Cisco

Cisco has released a semiannual security advisory bundle for its FXOS and NX-OS software, addressing four vulnerabilities, two of which are high-severity. The first high-severity issue, CVE-2024-20321, allows an unauthenticated attacker to send excessive traffic, potentially causing a denial-of-service (DoS) condition. This flaw affects certain Nexus switches and line cards. The second high-severity vulnerability, CVE-2024-20267, could lead to a DoS condition by processing an improperly checked ingress MPLS frame. This issue impacts Nexus switches with MPLS configured. Cisco has also patched two medium-severity vulnerabilities, one affecting the LLDP service and another related to ACL programming. The patches are available for NX-OS software versions 9.3(12), 10.2(6), and 10.3(4a).

https://sec.cloudapps.cisco.com/security/center/publicationListing.x

#cybersecurity #cisco #vulnerability #fxos #nxos #cve #dos #patch

Security Advisories

Quarter 1 datacenter maintenance window. This time I'm migrating our primary NetApp cluster to a new pair of cluster interconnect switches.

Wish me luck :)

#sysadmin #SysAdminLife #netapp #ontap #nxos

Hey #NetEng bubble, quick question.

We're considering exchanging AAA #TACACS for #LDAP (via Windows AD) on our #Cisco #NXOS & #ACI devices. Just simple user authentication, no authorization or accounting. Are there any draw backs or (bad) experiences we should know about? TIA 🙏

I’d also like to give an honorable mention to the Catalyst 4500-X. #NetEng #Cisco #NXOS
In Ciscos Router- und Firewall-Betriebssystemen FXOS und NX-OS hätten Angreifer beliebigen Code mit root-Rechten ausführen können. Updates stehen bereit.
Lücken in Ciscos FXOS und NX-OS ermöglichen Übernahme der Kontrolle
Lücken in Ciscos FXOS und NX-OS ermöglichen Übernahme der Kontrolle

In Ciscos Router- und Firewall-Betriebssystemen FXOS und NX-OS hätten Angreifer beliebigen Code mit root-Rechten ausführen können. Updates stehen bereit.

heise online