CVE-2022-20681 - Privilege Escalation Vulnerability
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2022 06:00 AM
Hi Experts ,
Can someone guide me how to check if this vulnerability impacting the software version which we use ,
Cisco IOS XE Software for Cisco Catalyst 9000 Family Switches and Catalyst 9000 Family Wireless Controllers Privilege Escalation Vulnerability
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ewlc-priv-esc-ybvHKO5
Cisco IOS XE Software, Version 17.03.03
Cisco IOS Software [Amsterdam], Catalyst L3 Switch Software (CAT9K_LITE_IOSXE), Version 17.3.3, RELEASE SOFTWARE (fc7)
Technical Support: http://www.cisco.com/techsupport
Copyright (c) 1986-2021 by Cisco Systems, Inc.
Compiled Thu 04-Mar-21 08:48 by mcpre
- Labels:
-
Catalyst 9000
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2022 08:45 AM
- FYI : https://tools.cisco.com/security/center/softwarechecker.x
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2022 09:05 AM
First available fix is 17.3.5 , So should we upgrade the IOS in this case ?
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2022 09:18 AM
- That depends on your security 'needs' and requirements , banks for instance may upgrade immediately , it needs to be assessed with IT staff and organization.
M.
-- Each morning when I wake up and look into the mirror I always say ' Why am I so brilliant ? '
When the mirror will then always repond to me with ' The only thing that exceeds your brilliance is your beauty! '
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-19-2022 03:52 PM
Upgrade directly to 17.3.5.
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-22-2022 07:32 AM
17.3.5 has a bug CSCwb13784 .
APs not able to join 9800 due to invalid path MTU in AP Join request.
Symptom: APs not able to join 9800 running 17.3.5, 17.6.2, 17.7.1 9800 ra-traces with ethernet mac: AP disconnect initiated. Reason: Invalid path MTU, Phase: Join Invalid MTU value 0 in join request
- Mark as New
- Bookmark
- Subscribe
- Mute
- Subscribe to RSS Feed
- Permalink
- Report Inappropriate Content
04-22-2022 06:57 PM - edited 04-22-2022 06:58 PM
@aci_network_test wrote:
17.3.5 has a bug CSCwb13784 .
REMINDER:
- Every Cisco firmware has bugs. End users, like you and me, are code "testers" because Cisco has stopped testing their own codes. I, for instance, have been "beta testing" Cisco firmware for more than 10 years and I "have been more busy than ever" since Cisco introduced IOS-XE.
- Cisco "gold star" does not mean the "good quality", "quality assured" nor "tested". The "gold star" is the complete opposite to "Cisco Safe Harbor".
The question is this: Are you hitting CSCwb13784?
