{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Cisco NX-OS version 7.0(3)I7(10) sans les correctifs nxos.CSCvy95696-n9k_ALL-1.0.0-7.0.3.I7.10.lib32_n9000.rpm, nxos.CSCvz80191-n9k_ALL-1.0.0-7.0.3.I7.10.lib32_n9000.rpm et nxos.CSCvx75912-n9k_ALL-1.0.0-7.0.3.I7.10.lib32_n9000.rpm","product":{"name":"NX-OS","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco UCS versions 4.2 ant\u00e9rieures \u00e0 4.2(1l)","product":{"name":"NX-OS","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco UCS versions 4.x ant\u00e9rieures \u00e0 4.1(3h)","product":{"name":"NX-OS","vendor":{"name":"Cisco","scada":false}}},{"description":"Cisco NX-OS version 9.3(8) sans les correctifs CSCvy95696-n9k_ALL-1.0.0-9.3.8.lib32_n9000.rpm, nxos.CSCvz80191-n9k_ALL-1.0.0-9.3.8.lib32_n9000.rpm et nxos.CSCvx75912-n9k_ALL-1.0.0-9.3.8.lib32_n9000.rpm","product":{"name":"NX-OS","vendor":{"name":"Cisco","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2022-20623","url":"https://www.cve.org/CVERecord?id=CVE-2022-20623"},{"name":"CVE-2022-20650","url":"https://www.cve.org/CVERecord?id=CVE-2022-20650"},{"name":"CVE-2022-20624","url":"https://www.cve.org/CVERecord?id=CVE-2022-20624"}],"links":[],"reference":"CERTFR-2022-AVI-183","revisions":[{"description":"Version initiale","revision_date":"2022-02-24T00:00:00.000000"}],"risks":[{"description":"D\u00e9ni de service \u00e0 distance"},{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Cisco NX-OS et\nNexus. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire \u00e0 distance et un d\u00e9ni de service \u00e0 distance.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans Cisco NX-OS et Nexus","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-nxos-nxapi-cmdinject-ULukNMZ2 du 23 f\u00e9vrier 2022","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-nxapi-cmdinject-ULukNMZ2"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-cfsoip-dos-tpykyDr du 23 f\u00e9vrier 2022","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cfsoip-dos-tpykyDr"},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-nxos-bfd-dos-wGQXrzxn du 23 f\u00e9vrier 2022","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-bfd-dos-wGQXrzxn"}]}
