Lucene search

K
ciscoCiscoCISCO-SA-20160727-AVS
HistoryJul 27, 2016 - 4:00 p.m.

Cisco Nexus 1000v Application Virtual Switch Cisco Discovery Protocol Packet Processing Denial of Service Vulnerability

2016-07-2716:00:00
tools.cisco.com
7

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

75.1%

A vulnerability in Cisco Discovery Protocol packet processing for the Cisco Nexus 1000v Application Virtual Switch (AVS) could allow an unauthenticated, remote attacker to cause the ESXi hypervisor to crash and display a purple diagnostic screen, resulting in a denial of service (DoS) condition.

The vulnerability is due to insufficient input validation of Cisco Discovery Protocol packets, which could result in a crash of the ESXi hypervisor due to an out-of-bound memory access. An attacker could exploit this vulnerability by sending a crafted Cisco Discovery Protocol packet to a targeted device. An exploit could allow the attacker to cause a DoS condition.

Cisco has released software updates that address this vulnerability. Workarounds that address this vulnerability are not available.

This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-avs[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160727-avs”]

Affected configurations

Vulners
Node
cisconx_osMatch4.2\(1\)sv1
OR
cisconx_osMatch4.2\(1\)sv2
OR
cisconx_osMatch5.2\(1\)sv3
OR
cisconx_osMatch4.2\(1\)sv1\(4\)
OR
cisconx_osMatch4.2\(1\)sv1\(4a\)
OR
cisconx_osMatch4.2\(1\)sv1\(4b\)
OR
cisconx_osMatch4.2\(1\)sv1\(5.1\)
OR
cisconx_osMatch4.2\(1\)sv1\(5.1a\)
OR
cisconx_osMatch4.2\(1\)sv1\(5.2\)
OR
cisconx_osMatch4.2\(1\)sv1\(5.2b\)
OR
cisconx_osMatch4.2\(1\)sv2\(1.1\)
OR
cisconx_osMatch4.2\(1\)sv2\(1.1a\)
OR
cisconx_osMatch4.2\(1\)sv2\(2.1\)
OR
cisconx_osMatch4.2\(1\)sv2\(2.1a\)
OR
cisconx_osMatch5.2\(1\)sv3\(1.4\)
OR
cisconx_osMatch5.2\(1\)sv3\(1.1\)
OR
cisconx_osMatch5.2\(1\)sv3\(1.3\)

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

6.5 Medium

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

75.1%

Related for CISCO-SA-20160727-AVS