First Impressions of Nitrux Linux: An Immutable OS
https://video.fosshq.org/videos/watch/5027ab90-bdd2-46bc-ad16-22c42ccf5a0c
First Impressions of Nitrux Linux: An Immutable OS
https://video.fosshq.org/videos/watch/5027ab90-bdd2-46bc-ad16-22c42ccf5a0c
First Impressions of Nitrux Linux: An Immutable OS
https://tux-edu.tv/videos/watch/bb0e644d-dd18-4b00-9302-d0c2f1835966
Cisco warns of NX-OS Zero-Day Exploited to deploy custom Malware.
Cisco has patched an NX-OS zero-day exploited in April attacks to install previously unknown malware as root on vulnerable switches. Admins can use the Cisco Software Checker page to determine whether devices on their network are exposed to attacks targeting the CVE-2024-20399 vulnerability.
https://sec.cloudapps.cisco.com/security/center/softwarechecker.x
#cisco #nexus #nxos #it #security #privacy #tech #engineering #news
A critical zero-day vulnerability, known as CVE-2024-20399, exists in the Command Line Interface (CLI) of Cisco NX-OS Software. This flaw allows attackers to run arbitrary commands as root on affected devices, posing a severe risk to network security, especially for those using Cisco's Nexus and MDS series switches. The issue stems from inadequate validation of arguments given to specific CLI commands. An attacker with admin rights can exploit this by inputting specially crafted arguments during a CLI command, gaining root access and the ability to execute any commands.
The Cisco Product Security Incident Response Team (PSIRT) discovered this vulnerability being actively exploited in April 2024, linking the attacks to a Chinese state-sponsored group called Velvet Ant. This group deployed malware through the flaw, enabling remote control, file uploads, and hidden malicious activities. Cisco has issued software updates to fix this issue, but there are no temporary solutions. It's crucial for administrators to install these updates immediately and frequently update admin passwords to reduce risks. Cisco offers a Software Checker tool to help identify affected software and the necessary updates. Organizations using affected Cisco products should prioritize patching and closely watch their networks for suspicious activity.
https://sec.cloudapps.cisco.com/security/center/softwarechecker.x
#cybersecurity #cisco #vulnerability #zeroday #cve #cli #nxos #nexus #mds #switch #root #psirt #velvetant #software #patch #update
A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands as root on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root. Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-cmd-injection-xD9OhyOP
Cisco has released a semiannual security advisory bundle for its FXOS and NX-OS software, addressing four vulnerabilities, two of which are high-severity. The first high-severity issue, CVE-2024-20321, allows an unauthenticated attacker to send excessive traffic, potentially causing a denial-of-service (DoS) condition. This flaw affects certain Nexus switches and line cards. The second high-severity vulnerability, CVE-2024-20267, could lead to a DoS condition by processing an improperly checked ingress MPLS frame. This issue impacts Nexus switches with MPLS configured. Cisco has also patched two medium-severity vulnerabilities, one affecting the LLDP service and another related to ACL programming. The patches are available for NX-OS software versions 9.3(12), 10.2(6), and 10.3(4a).
https://sec.cloudapps.cisco.com/security/center/publicationListing.x
#cybersecurity #cisco #vulnerability #fxos #nxos #cve #dos #patch
Quarter 1 datacenter maintenance window. This time I'm migrating our primary NetApp cluster to a new pair of cluster interconnect switches.
Wish me luck :)