Cisco Catalyst 9300 supply chain vulnerability patched

By
Follow google news

Attacker with physical access could install "persistent code".

Cisco has revealed a high-rated vulnerability in its Catalyst 9300 switch software that could allow persistent code to be installed by an attacker at boot time.

Cisco Catalyst 9300 supply chain vulnerability patched

The bug, detailed here, requires “level-15 privileges”, or “an unauthenticated attacker with physical access” to be exploited.

That means a bad actor in the supply chain – for example, compromised reseller staff – could “execute persistent code at boot time and break the chain of trust”.

“This vulnerability is due to errors that occur when retrieving the public release key that is used for image signature verification," the advisory stated.

The switches are vulnerable if they’re running IOS XE software using an IOS XE ROM Monitor earlier than Release 17.3.7r, Release 17.6.5r, or Release 17.8.1r.

The bug was one of nine high-rated and nine medium-rated vulnerabilities disclosed today, including six related to the company’s IOS and IOS XE software.

Got a news tip for our journalists? Share it with us anonymously here.
Copyright © iTnews.com.au . All rights reserved.
Tags:

Most Read Articles

Optus takes $826,000 hit for anti-scam breaches

Optus takes $826,000 hit for anti-scam breaches

Australia, US and UK sanction Russian cyber firms over ransomware links

Australia, US and UK sanction Russian cyber firms over ransomware links

JPMorgan, Citi, Morgan Stanley client data may be exposed by vendor's hack

JPMorgan, Citi, Morgan Stanley client data may be exposed by vendor's hack

Australia's AUKUS base to connect to subsea cables

Australia's AUKUS base to connect to subsea cables

Log In

  |  Forgot your password?