Lucene search

K
ciscoCiscoCISCO-SA-NXOS-IPIP-DOS-KCT9X4
HistoryJun 01, 2020 - 4:00 p.m.

Cisco NX-OS Software Unexpected IP in IP Packet Processing Vulnerability

2020-06-0116:00:00
tools.cisco.com
12

0.011 Low

EPSS

Percentile

83.9%

A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to bypass certain security boundaries or cause a denial of service (DoS) condition on an affected device.

The vulnerability is due to the affected device unexpectedly decapsulating and processing IP in IP packets that are destined to a locally configured IP address. An attacker could exploit this vulnerability by sending a crafted IP in IP packet to an affected device. A successful exploit could cause the affected device to unexpectedly decapsulate the IP in IP packet and forward the inner IP packet. This may result in IP packets bypassing input access control lists (ACLs) configured on the affected device or other security boundaries defined elsewhere in the network.

Under certain conditions, an exploit could cause the network stack process to crash and restart multiple times, leading to a reload of the affected device and a DoS condition.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4”]

0.011 Low

EPSS

Percentile

83.9%

Related for CISCO-SA-NXOS-IPIP-DOS-KCT9X4