Cisco iPXE Signature Bypass Vulnerability Allow Attackers To Boot Unverified Software 

by Esmeralda McKenzie
Cisco iPXE Signature Bypass Vulnerability Allow Attackers To Boot Unverified Software 

Cisco iPXE Signature Bypass Vulnerability Allow Attackers To Boot Unverified Software 

Cisco iPXE Boot Bypass Vulnerability

Cisco has identified a distinguished vulnerability in the iPXE boot characteristic of its IOS XR machine. This vulnerability stems from insufficient image verification all over the iPXE boot job, which could enable an authenticated, native attacker to set up an unverified machine image on affected devices.

An attacker could exploit this vulnerability by manipulating boot parameters, doubtlessly booting an unverified machine image on the machine.

Cisco has issued machine updates to take care of this safety flaw, but no workarounds are at the second accessible.

Google Info

“This vulnerability is attributable to insufficient image verification. An attacker could exploit this vulnerability by manipulating the boot parameters for image verification all over the iPXE boot job on an affected machine.”

“A a hit exploit could enable the attacker moreover an unverified machine image on the affected machine.” Cisco mentioned.

Affected Merchandise

The vulnerability impacts several Cisco merchandise working explicit versions of IOS XR Instrument, including:

  • 8000 Sequence Routers
  • ASR 9000 Sequence Aggregation Services and products Routers
  • Network Convergence Intention (NCS) 540, 560, 1000, 4000, 5000, 5500, and 5700 Sequence Routers

For detailed info about susceptible machine releases, consult with the Fastened Instrument share of the advisory.

Cisco has confirmed that the following merchandise are no longer plagued by this vulnerability:

  • IOS Instrument
  • IOS XE Instrument
  • NX-OS Instrument

Instrument Updates and Suggestions

Cisco advises potentialities to recurrently consult the Cisco Security Advisories page to settle their exposure and to salvage a entire upgrade resolution.

Forward of upgrading, construct clear that devices luxuriate in ample memory and that most fresh configurations shall be supported by the original free up. Possibilities with questions could per chance also fair mute contact the Cisco Technical Aid Heart (TAC) or their upkeep suppliers.

The table under outlines the first fastened releases for affected Cisco platforms:

Cisco Platform First Fastened Originate
8000 Sequence Routers 7.10.1
ASR 9000 Sequence Lightspeed-based mostly 24.1.1
ASR 9901 24.3.1
ASR 9903 24.3.1
NCS 560 24.2.1
NCS 1004 24.1.1
NCS 5500 7.10.1
NCS 5700 7.10.1

There don’t seem to be any fixes for ASR 9000 Sequence Tomahawk-based mostly line cards, NCS 1001, and NCS 4000.

No public bulletins or experiences of malicious exploitation of this vulnerability had been made. The Cisco Product Security Incident Response Team (PSIRT) continues to show screen the quandary.

The total advisory could per chance also additionally be accessed here for additional shrimp print. This advisory is share of the September 2023 free up of the Cisco IOS XR Instrument Security Advisory Bundled Publication.

Additionally Read:

Cisco Instrument Supervisor Password Change Vulnerability Let Hackers Change password

Microsoft Entra ID (Azure AD) Vulnerability Let Attackers Carry out Global Admin Rep entry to

AMD Patches Diverse Memory Vulnerabilities That Leads Injurious The Customer VM

Source credit : cybersecuritynews.com

Related Posts