CVE-2021-1361

9.8 CRITICAL

📋 TL;DR

This critical vulnerability allows unauthenticated remote attackers to create, delete, or overwrite arbitrary files with root privileges on affected Cisco Nexus switches. Attackers can exploit this by sending crafted TCP packets to port 9075, potentially adding unauthorized user accounts or modifying device configuration. Affected devices include Cisco Nexus 3000 and 9000 Series Switches running NX-OS Software in standalone mode.

💻 Affected Systems

Products:
  • Cisco Nexus 3000 Series Switches
  • Cisco Nexus 9000 Series Switches
Versions: Cisco NX-OS Software releases prior to the fixed versions listed in the advisory
Operating Systems: Cisco NX-OS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects switches running in standalone NX-OS mode (not ACI mode).

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete device compromise including persistent backdoor installation, configuration tampering, credential theft, and potential lateral movement to other network segments.

🟠

Likely Case

Unauthorized administrative access, configuration changes, data exfiltration, and service disruption.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent external access to port 9075.

🌐 Internet-Facing: HIGH - Directly exploitable from the internet if port 9075 is exposed.
🏢 Internal Only: HIGH - Exploitable from any network segment with access to the vulnerable port.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires only network access to TCP port 9075 and knowledge of the vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Cisco Security Advisory for specific fixed releases per platform

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3000-9000-fileaction-QtLzDRy2

Restart Required: Yes

Instructions:

1. Review Cisco Security Advisory for fixed releases. 2. Download appropriate software from Cisco.com. 3. Backup configuration. 4. Upgrade to fixed release following Cisco NX-OS upgrade procedures. 5. Verify upgrade success and functionality.

🔧 Temporary Workarounds

Block TCP Port 9075

all

Use access control lists (ACLs) to block external access to TCP port 9075 on all interfaces.

ip access-list extended BLOCK-9075
deny tcp any any eq 9075
permit ip any any
interface [interface-name]
ip access-group BLOCK-9075 in

Disable Unnecessary Services

all

Disable the vulnerable internal file management service if not required.

no feature [service-name]

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate affected switches from untrusted networks
  • Apply ACLs to block all traffic to TCP port 9075 from any source except management stations

🔍 How to Verify

Check if Vulnerable:

Check if TCP port 9075 is listening on interfaces: 'show ip sockets' or 'show running-config | include 9075'

Check Version:

show version | include Software

Verify Fix Applied:

Verify upgraded to fixed version: 'show version' and confirm port 9075 is not externally accessible

📡 Detection & Monitoring

Log Indicators:

  • Unexpected connections to TCP port 9075
  • File system modification logs
  • Authentication logs showing new user creation

Network Indicators:

  • TCP packets to port 9075 from unexpected sources
  • Unusual file transfer patterns to/from switch

SIEM Query:

source_port=9075 OR dest_port=9075 AND (protocol=TCP) AND (action=allow OR bytes_sent>0)

🔗 References

📤 Share & Export