Cisco ACI Multi-Site CloudSec Encryption Information Disclosure Vulnerability
A vulnerability in Cisco ACI Multi-Site CloudSec encryption allows a remote attacker to read or modify intersite encrypted traffic due to a flaw in cipher implementation.
A vulnerability exists within the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches when operating in ACI mode. This flaw enables an unauthenticated, remote adversary to potentially decipher and manipulate encrypted traffic traversing between sites. The vulnerability, identified as CVE-2023-20185, originates from an issue in the cipher implementation employed by the CloudSec encryption feature. Cisco has deprecated and removed the affected ACI Multi-Site CloudSec encryption feature.
Attack Chain
- Attacker establishes a network position on-path between ACI sites.
- The attacker intercepts intersite encrypted traffic.
- The attacker analyzes the captured traffic.
- The attacker exploits the weak cipher implementation.
- The attacker decrypts the intercepted traffic.
- The attacker reads sensitive data within the decrypted traffic.
- The attacker modifies the decrypted traffic.
- The attacker re-encrypts (or forwards unencrypted) the modified traffic toward the destination.
Impact
Successful exploitation of CVE-2023-20185 allows unauthorized reading and modification of data transmitted between ACI sites. The impact can range from data breaches and intellectual property theft to manipulated financial transactions and compromised control systems. The lack of a workaround necessitates immediate action to mitigate the risk.
Recommendation
- Apply configuration changes to remove usage of the CloudSec encryption feature.
- Monitor network traffic for unusual patterns indicative of man-in-the-middle attacks targeting intersite communication.
- Deploy the Sigma rules provided below to detect potential exploitation attempts targeting intersite traffic.
Detection coverage 2
Detect Intercepted Encrypted Traffic
mediumDetects unusual amounts of traffic between ACI sites, indicating possible interception.
Detect Potential Data Modification
mediumDetects unexpected traffic patterns that may be caused by the alteration of traffic.
Detection queries are kept inside the platform. Get full rules →