Input validation flaw in processing CDP packets in Cisco Nexus 1000v Application Virtual Switch - CVE-2016-1465
Published: July 28, 2016 / Updated: April 5, 2018
Vulnerability identifier: #VU229
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-1465
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Nexus 1000v Application Virtual Switch
Cisco Nexus 1000v Application Virtual Switch
Detailed vulnerability description
The vulnerability allows a remote attacker to cause denial of service conditions on the target system.
The vulnerability exists due to insufficient input validation of Cisco Discovery Protocol packets. A remote unauthenticated attacker can cause the ESXi hypervisor to crash and display a purple diagnostic screen by sending a crafted Cisco Discovery Protocol packet to a targeted device.
Successful exploitation of this vulnerability may result in denial of service condition.
The vulnerability exists due to insufficient input validation of Cisco Discovery Protocol packets. A remote unauthenticated attacker can cause the ESXi hypervisor to crash and display a purple diagnostic screen by sending a crafted Cisco Discovery Protocol packet to a targeted device.
Successful exploitation of this vulnerability may result in denial of service condition.
How to mitigate CVE-2016-1465
Install update from vendor's website.