VMware and Cisco patch vulnerabilities in DC gear and software

Pro
(Source: Stockfresh)

15 September 2014

VMware and Cisco Systems have released security fixes for serious vulnerabilities in networking virtualisation and server software typically used in data centres.

Cisco patched a persistent denial-of-service vulnerability that could prevent the out-of-band management of Cisco Unified Computing System (UCS) E-Series Blade servers that are deployed in Cisco Integrated Services Routers Generation 2 (ISR G2).

The vulnerability is located in the Secure Shell (SSH) service of the Cisco Integrated Management Controller (Cisco IMC), a specialised micro-controller embedded in server motherboards that allows systems administrators to monitor and manage servers from outside their OS.

Cisco released version 2.3.1 of the Cisco IMC firmware for UCS E-Series servers on Monday 8 September. Customers need to use the Host Upgrade Utility in order to deploy the new firmware.

The US Computer Emergency Readiness Team published an alert about the issue on Thursday 11 September.

If left unpatched, an attacker could exploit the vulnerability by sending a specially crafted packet to the vulnerable SSH server, forcing the IMC to become unresponsive. This could impact the availability of the entire server.

“Recovery of the Cisco IMC will likely require a restart of the affected E-Series Server via physical interaction with the blade’s power switch, or a restart of the ISR G2 router that the device is installed in,” Cisco said in an advisory. “A restart of the E-Series blades via the power switch will cause a loss of power to the operating system running on the device. A restart of the ISR G2 router will cause a loss of all traffic passing through the router while it restarts as well as impacting the blade servers installed in the device.”

VMware released security updates Thursday 11 September for its NSX and vCloud Networking and Security (vCNS) products in order to patch what the company called “a critical information disclosure” vulnerability. The company’s advisory does not clarify what kind of information can be disclosed by exploiting the issue, but both the NSX and vCNS products are used for virtualising network services.

The VMware NSX allows datacentre administrators to create, provision, snapshot, delete and restore complex networks programmatically from software by utilising the underlying physical network just for packet forwarding. VCNS provides networking and security functionality for virtualised computing environments through services like a virtual firewall, virtual private network (VPN), load balancing, NAT, DHCP and VXLAN-extended networks.

 

Lucian Constantin, IDG News Service

Read More:


Back to Top ↑

TechCentral.ie