Lucene search

K
ciscoCiscoCISCO-SA-20130529-CVE-2013-1212
HistoryMay 29, 2013 - 4:02 p.m.

Cisco Nexus 1000V VSM to vCenter Communication Man-in-the-Middle Vulnerability

2013-05-2916:02:25
tools.cisco.com
11

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

27.9%

A vulnerability in the SSL implementation of the Cisco Nexus 1000V could allow an unauthenticated, remote attacker to perform a man-in-the-middle attack against Virtual Supervisor Module (VSM) to VMware vCenter communications.

The vulnerability is due to improper verification of SSL security certificates by the VSM. An attacker could exploit this vulnerability to eavesdrop on communications, and to inject modified or arbitrary data.

Cisco would like to thank Felix ‘FX’ Lindner, Recurity Labs GmbH, for reporting this issue to us.

Cisco has confirmed the vulnerability in a security notice; however, software updates are not available.

To exploit this vulnerability, the attacker would likely need access to a trusted, internal network in which the targeted device may reside and have access to the communication path between the VSM and vCenter server. These access restrictions limits the possibility of a successful exploit.

Customers are advised to review the bug reports in the “Vendor Announcements” section for a current list of affected versions.

Affected configurations

Vulners
Node
cisconx_osMatch4.2\(1\)sv1
OR
cisconx_osMatch4.2\(1\)sv1\(5.1\)

5.8 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:P/I:P/A:N

0.001 Low

EPSS

Percentile

27.9%

Related for CISCO-SA-20130529-CVE-2013-1212