CVSS2
Attack Vector
NETWORK
Attack Complexity
HIGH
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:H/Au:N/C:N/I:N/A:C
EPSS
Percentile
53.2%
A vulnerability in the Border Gateway Protocol (BGP) code of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload.
The vulnerability is due to an issue with the regex engine used when processing complex regular expressions. An attacker could exploit this vulnerability by injecting specific autonomous system (AS) path sets. If the affected device has a complex regular expression applied to the inbound routes, the vulnerability may be triggered. An exploit could allow the attacker to trigger Cisco NX-OS Software to restart.
Cisco has confirmed the vulnerability in a security notice and released software updates.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | nx_os | 4.1 | cpe:2.3:o:cisco:nx_os:4.1:*:*:*:*:*:*:* |
cisco | nx_os | 5.0 | cpe:2.3:o:cisco:nx_os:5.0:*:*:*:*:*:*:* |
cisco | nx_os | 4.2 | cpe:2.3:o:cisco:nx_os:4.2:*:*:*:*:*:*:* |
cisco | nx_os | 5.1 | cpe:2.3:o:cisco:nx_os:5.1:*:*:*:*:*:*:* |
cisco | nx_os | 5.2 | cpe:2.3:o:cisco:nx_os:5.2:*:*:*:*:*:*:* |
cisco | nx_os | 6.1 | cpe:2.3:o:cisco:nx_os:6.1:*:*:*:*:*:*:* |
cisco | nx_os | 5.0(2)n2 | cpe:2.3:o:cisco:nx_os:5.0\(2\)n2:*:*:*:*:*:*:* |
cisco | nx_os | 5.0(3)n1 | cpe:2.3:o:cisco:nx_os:5.0\(3\)n1:*:*:*:*:*:*:* |
cisco | nx_os | 5.0(3)n2 | cpe:2.3:o:cisco:nx_os:5.0\(3\)n2:*:*:*:*:*:*:* |
cisco | nx_os | 5.1(3)n1 | cpe:2.3:o:cisco:nx_os:5.1\(3\)n1:*:*:*:*:*:*:* |