Lucene search

K
ciscoCiscoCISCO-SA-20140106-CVE-2013-6982
HistoryJan 06, 2014 - 9:54 p.m.

Cisco NX-OS Software Crafted Border Gateway Protocol Update Message Denial of Service Vulnerability

2014-01-0621:54:40
tools.cisco.com
14

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.012

Percentile

85.0%

A vulnerability in the Border Gateway Protocol (BGP) functionality of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause all BGP sessions on the device to reset.

The vulnerability is due to the improper processing of specifically crafted BGP update messages. An attacker could exploit this vulnerability by crafting a specific BGP-labeled update message. An exploit could allow the attacker to cause all the BGP peers on a Cisco NX-OS device that are configured with either a VPNv4, VPNv6, or IPv6 labeled unicast address family to reset.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, it is likely that an attacker would need access to trusted, internal networks in order to send crafted BGP update messages to be processed by the targeted device. This access requirement may reduce the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
cisconx_osMatch5.2
OR
cisconx_osMatch6.1
OR
cisconx_osMatch6.0
OR
cisconx_osMatch6.2
OR
cisconx_osMatch5.2\(1\)
OR
cisconx_osMatch5.2\(3a\)
OR
cisconx_osMatch5.2\(4\)
OR
cisconx_osMatch5.2\(5\)
OR
cisconx_osMatch5.2\(7\)
OR
cisconx_osMatch5.2\(9\)
OR
cisconx_osMatch6.1\(1\)
OR
cisconx_osMatch6.1\(2\)
OR
cisconx_osMatch6.1\(3\)
OR
cisconx_osMatch6.1\(4\)
OR
cisconx_osMatch6.1\(4a\)
OR
cisconx_osMatch6.0\(1\)
OR
cisconx_osMatch6.0\(2\)
OR
cisconx_osMatch6.0\(3\)
OR
cisconx_osMatch6.0\(4\)
OR
cisconx_osMatch6.2\(2\)
OR
cisconx_osMatch6.2\(2a\)
VendorProductVersionCPE
cisconx_os5.2cpe:2.3:o:cisco:nx_os:5.2:*:*:*:*:*:*:*
cisconx_os6.1cpe:2.3:o:cisco:nx_os:6.1:*:*:*:*:*:*:*
cisconx_os6.0cpe:2.3:o:cisco:nx_os:6.0:*:*:*:*:*:*:*
cisconx_os6.2cpe:2.3:o:cisco:nx_os:6.2:*:*:*:*:*:*:*
cisconx_os5.2(1)cpe:2.3:o:cisco:nx_os:5.2\(1\):*:*:*:*:*:*:*
cisconx_os5.2(3a)cpe:2.3:o:cisco:nx_os:5.2\(3a\):*:*:*:*:*:*:*
cisconx_os5.2(4)cpe:2.3:o:cisco:nx_os:5.2\(4\):*:*:*:*:*:*:*
cisconx_os5.2(5)cpe:2.3:o:cisco:nx_os:5.2\(5\):*:*:*:*:*:*:*
cisconx_os5.2(7)cpe:2.3:o:cisco:nx_os:5.2\(7\):*:*:*:*:*:*:*
cisconx_os5.2(9)cpe:2.3:o:cisco:nx_os:5.2\(9\):*:*:*:*:*:*:*
Rows per page:
1-10 of 211

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:M/Au:N/C:N/I:N/A:P

EPSS

0.012

Percentile

85.0%

Related for CISCO-SA-20140106-CVE-2013-6982