Cisco issued some 40 security advisories today but only one of them was deemed \u201ccritical\u201d\u00a0\u2013 a vulnerability in the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode data-center switch that could let an attacker secretly access system resources.\nThe exposure, which was given a Common Vulnerability Scoring System importance of 9.8 out of 10, is described as a problem with secure shell (SSH) key-management for the Cisco Nexus 9000 that lets a remote attacker to connect to the affected system with the privileges of a root user, Cisco said.\n\n\u201cThe vulnerability is due to the presence of a default SSH key pair that is present in all devices. An attacker could exploit this vulnerability by opening an SSH connection via IPv6 to a targeted device using the extracted key materials. This vulnerability is only exploitable over IPv6; IPv4 is not vulnerable," Cisco wrote.\nThis vulnerability affects Nexus 9000s if they are running a Cisco NX-OS software\u00a0release prior to\u00a014.1, and the company said there were no workarounds to address the problem.\u00a0 \u00a0\nHowever, Cisco has released free software updates that address the vulnerability.\nThe company also issued a \u201chigh\u201d security warning advisory for the Nexus 9000 that involves an exploit that would let attackers execute arbitrary operating-system commands as root on an affected device. To succeed, an attacker would need valid administrator credentials for the device, Cisco said.\u00a0\nThe vulnerability is due to overly broad system-file permissions, Cisco wrote. \u00a0An attacker could exploit this vulnerability by authenticating to an affected device, creating a crafted command string and writing this crafted string to a specific file location.\nCisco has released software updates that address this vulnerability.\nTwo other vulneraries rated \u201chigh\u201d also involved the Nexus 9000:\n\nA vulnerability in the background-operations functionality of Cisco Nexus 9000 software could allow an authenticated, local attacker to gain elevated privileges as root on an affected device. The vulnerability is due to insufficient validation of user-supplied files on an affected device. Cisco said an attacker could exploit this vulnerability by logging in to the CLI of the affected device and creating a crafted file in a specific directory on the filesystem.\nA weakness in the background-operations functionality of the switch software could allow an attacker to login to the CLI of the affected device and create a crafted file in a specific directory on the filesystem. The vulnerability is due to insufficient validation of user-supplied files on an affected device, Cisco said.\n\nCisco has released software for these vulnerabilities as well.\nAlso part of these security alerts were a number of \u201chigh\u201d rated warnings about vulneraries in Cisco\u2019s FirePower firewall series.\nFor example Cisco wrote that multiple vulnerabilities in the Server Message Block Protocol preprocessor detection engine for Cisco\u00a0Firepower Threat Defense Software could allow an unauthenticated, adjacent or remote attacker to cause a denial of service (DoS) condition.\nYet another vulnerability in the internal packet-processing functionality of Cisco Firepower software for the Cisco Firepower 2100 Series could let an unauthenticated, remote attacker cause an affected device to stop processing traffic, resulting in a DOS situation, Cisco said.\nSoftware patches are available for these vulnerabilities.\u00a0\nOther products such as the Cisco Adaptive Security Virtual Appliance, and Web Security appliance had high priority patches as well.