Sunday, 29 Mar 2026
Subscribe
logo
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Font ResizerAa
Data Center NewsData Center News
Search
  • Global
  • AI
  • Cloud Computing
  • Edge Computing
  • Security
  • Investment
  • Sustainability
  • More
    • Colocation
    • Quantum Computing
    • Regulation & Policy
    • Infrastructure
    • Power & Cooling
    • Design
    • Innovations
    • Blog
Have an existing account? Sign In
Follow US
© 2022 Foxiz News Network. Ruby Design Company. All Rights Reserved.
Data Center News > Blog > Global Market > Chained vulnerabilities in Cisco Catalyst switches could induce denial-of-service
Global Market

Chained vulnerabilities in Cisco Catalyst switches could induce denial-of-service

Last updated: March 29, 2026 11:42 am
Published March 29, 2026
Share
Cisco building exterior with sign
SHARE

Opswat additionally found two different Catalyst 9300 vulnerabilities: CVE-2026-20112 (cross-site scripting) and CVE-2026-20113 (CRLF injection). These relate to the IOS XE IOx integration atmosphere which allows cloud edge computing options on Catalyst switches.

The primary of those, CVE-2026-20112, could possibly be exploited by an “authenticated person [who] may retailer malicious JavaScript payloads that may later execute within the context of one other person’s session,” mentioned Opswat in its full vulnerability analysis.

The second, CVE-2026-20113, would enable an attacker to cowl their tracks for any exploit on IOS XE IOx: “By injecting crafted management characters, an attacker can forge or manipulate log entries, probably obscuring malicious exercise and compromising the integrity of audit information,” mentioned Opswat, including that this weakens the reliability of logging mechanisms essential for monitoring, incident response, and forensic evaluation.

Patching precedence

To make headway, an attacker would want to chain the primary two vulnerabilities, CVE-2026-20114 and CVE-2026-20110, the primary of which might require authentication utilizing stolen credentials.

This barely raises the bar to any compromise, though stealing credentials for low-privilege person accounts just isn’t a serious barrier for an attacker.

Nonetheless, the truth that an attacker can elevate privileges from a fundamental Foyer Ambassador account to place a swap right into a denial-of-service state underlines the chance this vulnerability poses. A brief-term mitigation for this could be to ensure MFA safety is turned on for all person accounts accessing the Foyer Ambassador function.

Source link

See also  Pilot Photonics and Finchetto collaborate on next-gen data centre switches
TAGGED: catalyst, chained, Cisco, denialofservice, induce, Switches, vulnerabilities
Share This Article
Twitter Email Copy Link Print
Previous Article Meanwhile in the server room.... Rearview shot of two IT technicians having difficulty repairing a computer in a data center. Panasonic says data center batteries are selling out and AI is to blame
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Your Trusted Source for Accurate and Timely Updates!

Our commitment to accuracy, impartiality, and delivering breaking news as it happens has earned us the trust of a vast audience. Stay ahead with real-time updates on the latest events, trends.
FacebookLike
TwitterFollow
InstagramFollow
YoutubeSubscribe
LinkedInFollow
MediumFollow
- Advertisement -
Ad image

Popular Posts

Retrofitting, Refurbishment, and the ROI for Legacy Data Centers | DCN

The constantly evolving data center environment, characterized by increasing rack densities, is pushing hundreds of…

January 29, 2024

Nvidia CEO: Someday we’ll have 1B robotic cars on the road

Nvidia CEO Jensen Huang predicted that sometime we’ll have a billion vehicles on the street…

March 2, 2025

A ChatGPT ‘router’ that automatically selects the right OpenAI model for your job appears imminent

Need smarter insights in your inbox? Join our weekly newsletters to get solely what issues…

July 28, 2025

Signal Rock Capital Launches to Back Lower Middle-Market Industrial, Consumer, and Healthcare Service Companies

Signal Rock Capital, a West Palm Seashore, FL-based non-public funding agency, has formally launched operations.…

July 27, 2025

One Stop Systems tapped for production-scale autonomous patrol vessel deployment

One Cease Programs (OSS), an edge computing answer supplier, introduced a 3rd order from a…

July 2, 2025

You Might Also Like

Meanwhile in the server room.... Rearview shot of two IT technicians having difficulty repairing a computer in a data center.
Global Market

Panasonic says data center batteries are selling out and AI is to blame

By saad
ip network devices
Global Market

The optical imperative and Nokia’s vision to close the AI gap

By saad
Big data technology and data science illustration. Data flow concept. Querying, analysing, visualizing complex information. Neural network for artificial intelligence. Data mining. Business analytics.
Global Market

AI’s need for speed, optical connectivity in focus at OFC 2026

By saad
image of Woman holding laptop in data center
Global Market

Equinix launches AI platform to simplify control of distributed AI resources

By saad
Data Center News
Facebook Twitter Youtube Instagram Linkedin

About US

Data Center News: Stay informed on the pulse of data centers. Latest updates, tech trends, and industry insights—all in one place. Elevate your data infrastructure knowledge.

Top Categories
  • Global Market
  • Infrastructure
  • Innovations
  • Investments
Usefull Links
  • Home
  • Contact
  • Privacy Policy
  • Terms & Conditions

© 2024 – datacenternews.tech – All rights reserved

Welcome Back!

Sign in to your account

Lost your password?
We use cookies to ensure that we give you the best experience on our website. If you continue to use this site we will assume that you are happy with it.
You can revoke your consent any time using the Revoke consent button.