CVE-2023-20200
📋 TL;DR
A vulnerability in Cisco FXOS Software and UCS 6300 Series Fabric Interconnects allows authenticated remote attackers to cause denial of service by sending crafted SNMP requests. This affects all supported SNMP versions and requires knowledge of SNMP community strings (v2c/earlier) or valid credentials (v3). The vulnerability causes affected devices to reload, disrupting network services.
💻 Affected Systems
- Cisco Firepower 4100 Series
- Cisco Firepower 9300 Security Appliances
- Cisco UCS 6300 Series Fabric Interconnects
📦 What is this software?
Ucs 6324 Fabric Interconnect Firmware by Cisco
View all CVEs affecting Ucs 6324 Fabric Interconnect Firmware →
Ucs 6324 Fabric Interconnect Firmware by Cisco
View all CVEs affecting Ucs 6324 Fabric Interconnect Firmware →
Ucs 6332 16up Fabric Interconnect Firmware by Cisco
View all CVEs affecting Ucs 6332 16up Fabric Interconnect Firmware →
Ucs 6332 16up Fabric Interconnect Firmware by Cisco
View all CVEs affecting Ucs 6332 16up Fabric Interconnect Firmware →
⚠️ Risk & Real-World Impact
Worst Case
Complete device reload causing extended service disruption, potentially affecting entire network segments or data center operations.
Likely Case
Temporary service interruption during device reload, lasting several minutes, with potential cascading effects on dependent services.
If Mitigated
Minimal impact if SNMP access is properly restricted and monitored, with quick recovery from reload.
🎯 Exploit Status
Exploitation requires SNMP access with valid credentials or community strings. Attack is straightforward once access is obtained.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Refer to Cisco Security Advisory for specific fixed versions
Vendor Advisory: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-fp-ucsfi-snmp-dos-qtv69NAO
Restart Required: Yes
Instructions:
1. Review Cisco Security Advisory for affected versions. 2. Download and apply appropriate firmware update. 3. Reboot affected devices after patching. 4. Verify SNMP functionality post-update.
🔧 Temporary Workarounds
Disable SNMP Service
allCompletely disable SNMP service on affected devices if not required for monitoring.
no snmp-server enable
Restrict SNMP Access
allLimit SNMP access to trusted management networks using ACLs.
snmp-server community [community-string] ro [acl-name]
access-list [acl-name] permit [trusted-network]
🧯 If You Can't Patch
- Implement strict network segmentation to limit SNMP access to management networks only
- Monitor SNMP traffic for anomalous patterns and implement rate limiting
🔍 How to Verify
Check if Vulnerable:
Check device version against affected versions in Cisco Security Advisory. Verify SNMP is enabled and accessible.
Check Version:
show version
Verify Fix Applied:
Confirm device is running patched firmware version. Test SNMP functionality with legitimate queries.
📡 Detection & Monitoring
Log Indicators:
- Device reload events without clear cause
- Multiple failed SNMP authentication attempts followed by reload
- SNMP request logs showing malformed or unusual requests
Network Indicators:
- Unusual SNMP traffic patterns to affected devices
- SNMP requests from unexpected sources
- Device becoming unresponsive after SNMP traffic
SIEM Query:
source="cisco-firepower" OR source="cisco-ucs" AND (event_type="reload" OR message="SNMP" AND (message="malformed" OR message="error"))