
=====================================================================

                              CERT-Renater

                    Note d'Information No. 2021/VULN093
____________________________________________________________________

DATE                : 23/02/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Cisco NX-OS Software,
                     Cisco Nexus 9000 Series Switches software,
                              Cisco FXOS Software.

=====================================================================
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-cmdinject-ULukNMZ2
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cfsoip-dos-tpykyDr
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bfd-dos-wGQXrzxn
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-tcp-dos-YXukt6gM
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-dos-G8DPLWYG
_____________________________________________________________________

Below is the list of Cisco Security Advisories published by Cisco
PSIRT on 2022-February-23.

The following PSIRT security advisories (4 High, 1 Medium) were
published at 16:00 UTC today.

Table of Contents:

1) Cisco NX-OS Software NX-API Command Injection Vulnerability
      - SIR: High

2) Cisco NX-OS Software Cisco Fabric Services Over IP Denial of
      Service Vulnerability - SIR: High

3) Cisco Nexus 9000 Series Switches Bidirectional Forwarding Detection
      Denial of Service Vulnerability - SIR: High

4) Cisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod and
      Multi-Site TCP Denial of Service Vulnerability - SIR: High

5) Cisco FXOS and NX-OS Software Cisco Discovery Protocol Service
      Denial of Service Vulnerability - SIR: Medium

+--------------------------------------------------------------------

1) Cisco NX-OS Software NX-API Command Injection Vulnerability

CVE-2022-20650

SIR: High

CVSS Score v(3.1): 8.8

URL: 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-cmdinject-ULukNMZ2 
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-cmdinject-ULukNMZ2"]

+--------------------------------------------------------------------

2) Cisco NX-OS Software Cisco Fabric Services Over IP Denial of Service 
Vulnerability

CVE-2022-20624

SIR: High

CVSS Score v(3.1): 8.6

URL: 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cfsoip-dos-tpykyDr 
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cfsoip-dos-tpykyDr"]

+--------------------------------------------------------------------

3) Cisco Nexus 9000 Series Switches Bidirectional Forwarding Detection 
Denial of Service Vulnerability

CVE-2022-20623

SIR: High

CVSS Score v(3.1): 8.6

URL: 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bfd-dos-wGQXrzxn 
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bfd-dos-wGQXrzxn"]

+--------------------------------------------------------------------

4) Cisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod and 
Multi-Site TCP Denial of Service Vulnerability

CVE-2021-1586

SIR: High

CVSS Score v(3.1): 8.6

URL: 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-tcp-dos-YXukt6gM 
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-tcp-dos-YXukt6gM"]

+--------------------------------------------------------------------

5) Cisco FXOS and NX-OS Software Cisco Discovery Protocol Service Denial 
of Service Vulnerability

CVE-2022-20625

SIR: Medium

CVSS Score v(3.1): 4.3

URL: 
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-dos-G8DPLWYG 
["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cdp-dos-G8DPLWYG"]


=========================================================
+ CERT-RENATER       | tel : 01-53-94-20-44             +
+ 23/25 Rue Daviel   | fax : 01-53-94-20-41             +
+ 75013 Paris        | email:cert@support.renater.fr    +
=========================================================

