Input validation flaw in processing CDP packets in Cisco Nexus 1000v Application Virtual Switch - CVE-2016-1465

 

Input validation flaw in processing CDP packets in Cisco Nexus 1000v Application Virtual Switch - CVE-2016-1465

Published: July 28, 2016 / Updated: April 5, 2018


Vulnerability identifier: #VU229
CSH Severity: Medium
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Green
CVE-ID: CVE-2016-1465
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Nexus 1000v Application Virtual Switch

Detailed vulnerability description

The vulnerability allows a remote attacker to cause denial of service conditions on the target system.

The vulnerability exists due to insufficient input validation of Cisco Discovery Protocol packets. A remote unauthenticated attacker can cause the ESXi hypervisor to crash and display a purple diagnostic screen by sending a crafted Cisco Discovery Protocol packet to a targeted device.

Successful exploitation of this vulnerability may result in denial of service condition.

How to mitigate CVE-2016-1465

Install update from vendor's website.

Sources