Cisco Nexus 9000 Users Must Disable Encryption to Dodge Vuln

There is no workaround or patch for a high-severity vulnerability—and none will be forthcoming—in Cisco’s Nexus 9000 series switches. The vulnerability opens up the landscape to unauthenticated attackers itching to intercept and modify network traffic.

“This vulnerability is due to an issue with the implementation of the ciphers that are used by the CloudSec encryption feature on affected switches,” Cisco said in an advisory on CVE-2023-20185.

AWS Builder Community Hub

“An attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption,” the company said. “A successful exploit could allow the attacker to read or modify the traffic that is transmitted between the sites.”

The vulnerability affects those Cisco Nexus 9000 Series Fabric Switches in ACI mode running releases 14.0 and later that are part of a multi-site topology and with CloudSec encryption feature enabled.

“The advisory is deliberately vague about the weakness in Cisco’s encryption algorithm that would allow an adversary to read or modify the traffic,” said Phil Neray, vice president of cyber defense strategy, CardinalOps.

“This is a serious issue, because it enables adversaries to access sensitive data as well as move laterally across the network,” said Neray. “Cisco recommends disabling the feature and contacting support to evaluate alternative options, which are also not described to prevent adversaries from exploiting them as well.”

However, “given the limited information available at the moment, it appears that the vulnerability would be difficult to exploit—but, if successful, an attacker would gain unencrypted access to otherwise secure network traffic,” said Mike Parkin, senior technical engineer at Vulcan Cyber.

Cisco is advising users who have the Cisco ACI Multi-Site CloudSec encryption feature engaged for the Cisco Nexus 9332C and Nexus 9364C Switches and the Cisco Nexus N9K-X9736C-FX Line Card to disable the feature and “contact their support organization to evaluate alternative options, such as performing encryption on the underlying site-to-site connections,” the advisory said. “There are no alternatives that provide full encryption for data in transit between sites on current ACI Spine Switches hardware.”

While disabling the affected Nexus 9000 switches “may cause operational disruptions and impact network functionality, it is a proactive measure aimed at mitigating potential risks until an official patch becomes available,” said Callie Guenther, cyber threat research senior manager at Critical Start.

That Cisco is not offering an update has security pros puzzled. “I’m not sure I’ve ever seen a vendor say there are no updates and that they should unplug the device and find another product instead,” said John Bambenek, principal threat hunter at Netenrich.

“Being able to intercept and decrypt (and potentially modify traffic) is a significant issue, especially in data centers where sensitive data is stored and accessed,” said Bambenek. “For Cisco to tell its customers to disable the device tells me all I need to know about the severity of this vulnerability—I would advise anyone to contact support to figure out how to move forward.”

Noting that “Cisco has not released patches to address this vulnerability, and it is yet to be officially listed by databases like MITRE and NIST,” Guenther said, “While the absence of patches and official listings may raise concerns, it is important to understand that addressing vulnerabilities of this nature involves complex processes, coordination and testing.”

She left open the possibility that “the delay in releasing a fix may be due to the intricacies involved in developing an effective solution rather than negligence on Cisco’s part.”

Avatar photo

Teri Robinson

From the time she was 10 years old and her father gave her an electric typewriter for Christmas, Teri Robinson knew she wanted to be a writer. What she didn’t know is how the path from graduate school at LSU, where she earned a Masters degree in Journalism, would lead her on a decades-long journey from her native Louisiana to Washington, D.C. and eventually to New York City where she established a thriving practice as a writer, editor, content specialist and consultant, covering cybersecurity, business and technology, finance, regulatory, policy and customer service, among other topics; contributed to a book on the first year of motherhood; penned award-winning screenplays; and filmed a series of short movies. Most recently, as the executive editor of SC Media, Teri helped transform a 30-year-old, well-respected brand into a digital powerhouse that delivers thought leadership, high-impact journalism and the most relevant, actionable information to an audience of cybersecurity professionals, policymakers and practitioners.

teri-robinson has 185 posts and counting.See all posts by teri-robinson