CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
77.8%
A vulnerability in the implementation of the DHCPv4 relay agent in Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
The vulnerability is due to improper validation of malformed DHCPv4 packets. An attacker could exploit this vulnerability by sending malformed DHCPv4 packets to an affected device. An exploit could allow the attacker to cause the DHCP process or device to crash.
This vulnerability can be exploited using IPv4 packets only. The vulnerability can be triggered by malformed DHCP packets processed by a DHCP relay agent listening on the device, using the IPv4 broadcast address or IPv4 unicast address of any interface configured on a device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp2 [“https://tvce.cisco.com/security/AIMS/https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-dhcp2”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | nx_os | 4.1 | cpe:2.3:o:cisco:nx_os:4.1:*:*:*:*:*:*:* |
cisco | nx_os | 5.0 | cpe:2.3:o:cisco:nx_os:5.0:*:*:*:*:*:*:* |
cisco | nx_os | 4.2 | cpe:2.3:o:cisco:nx_os:4.2:*:*:*:*:*:*:* |
cisco | nx_os | 5.1 | cpe:2.3:o:cisco:nx_os:5.1:*:*:*:*:*:*:* |
cisco | nx_os | 5.2 | cpe:2.3:o:cisco:nx_os:5.2:*:*:*:*:*:*:* |
cisco | nx_os | 6.1 | cpe:2.3:o:cisco:nx_os:6.1:*:*:*:*:*:*:* |
cisco | nx_os | 4.2(1)n1 | cpe:2.3:o:cisco:nx_os:4.2\(1\)n1:*:*:*:*:*:*:* |
cisco | nx_os | 4.2(1)n2 | cpe:2.3:o:cisco:nx_os:4.2\(1\)n2:*:*:*:*:*:*:* |
cisco | nx_os | 5.0(2)n1 | cpe:2.3:o:cisco:nx_os:5.0\(2\)n1:*:*:*:*:*:*:* |
cisco | nx_os | 5.0(2)n2 | cpe:2.3:o:cisco:nx_os:5.0\(2\)n2:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS
Percentile
77.8%