An internal security review has identified an unauthenticated remote code execution vulnerability in Cloud Networking Operating System (CNOS)’ optional REST API management interface. This interface is disabled by default and not vulnerable unless enabled. When enabled, it is only vulnerable where attached to a VRF and as allowed by defined ACLs. Lenovo strongly recommends upgrading to a non-vulnerable CNOS release. Where not possible, Lenovo recommends disabling the REST API management interface or restricting access to the management VRF and further limiting access to authorized management stations via ACL.

Project Subscriptions

Vendors Products
Cloud Networking Operating System Subscribe
Rackswitch G8272 Subscribe
Rackswitch G8296 Subscribe
Rackswitch G8332 Subscribe
Rackswitch Ne0152t Subscribe
Rackswitch Ne10032 Subscribe
Rackswitch Ne1032 Subscribe
Rackswitch Ne1032t Subscribe
Rackswitch Ne1072t Subscribe
Rackswitch Ne2572 Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2020-29216 An internal security review has identified an unauthenticated remote code execution vulnerability in Cloud Networking Operating System (CNOS)’ optional REST API management interface. This interface is disabled by default and not vulnerable unless enabled. When enabled, it is only vulnerable where attached to a VRF and as allowed by defined ACLs. Lenovo strongly recommends upgrading to a non-vulnerable CNOS release. Where not possible, Lenovo recommends disabling the REST API management interface or restricting access to the management VRF and further limiting access to authorized management stations via ACL.
Fixes

Solution

Upgrade to the CNOS version 10.10.6.0 or later.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: lenovo

Published:

Updated: 2024-08-04T09:56:28.342Z

Reserved: 2020-01-28T00:00:00

Link: CVE-2020-8349

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-10-14T22:15:13.653

Modified: 2024-11-21T05:38:45.380

Link: CVE-2020-8349

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses