Cisco, an American multinational technology company, is warning customers about a high-severity vulnerability known as CVE-2023-20185 that exists in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches and could be exploited to impact some data centre switch models and allow attackers to tamper with encrypted traffic. The vulnerability is triggered by a flaw in how the CloudSec encryption feature on the vulnerable switches is implemented. This issue affects only Cisco Nexus 9332C, 9364C, and 9500 spine switches (fitted with a Cisco Nexus N9K-X9736C-FX Line Card) that are in ACI mode, part of a Multi-Site topology, have the CloudSec encryption feature enabled, and are running firmware 14.0 or later releases. According to Cisco, effective exploitation allows unauthenticated attackers to view or manipulate remotely transmitted intersite encrypted communications. Furthermore, Cisco stated that no security update is available to address the CVE-2023-20185 vulnerability, and that no workaround is available to address the vulnerability. Furthermore, Cisco advised users to disable the vulnerable feature if they used compromised data center switches.
A recent cyber campaign has been observed targeting procurement and sales professionals through RFQ (Request for Quotation) themed phishing emails. Attackers impersonate legitimate...
Apple has expanded the release of iOS 18.7.7 and iPadOS 18.7.7 to protect users from a serious web-based threat known as the DarkSword exploit. Although initial fixes for this expl...
A major cybersecurity breach has exposed sensitive military-related data after attackers compromised PSK Wind Technologies, a defense contractor supporting the Israel Defense Force...