Vulnerability identifier: #VU19606
Vulnerability risk: Medium
CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]
CVE-ID:
CWE-ID:
CWE-119
Exploitation vector: Local network
Exploit availability: No
Vulnerable software:
Cisco Nexus 9000 Series Switches in ACI Mode
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Cisco Systems, Inc
Description
The vulnerability allows an attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges.
The vulnerability exists due to improper input validation of certain type, length, value (TLV) fields of the Link Layer Discovery Protocol (LLDP) frame header. An attacker can send a specially crafted LLDP packet to the targeted device, trigger memory corruption and cause a DoS condition or execute arbitrary code with root privileges.
Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
Note: This vulnerability cannot be exploited by transit traffic through the device; the crafted packet must be targeted to a directly connected interface.
Mitigation
Install update from vendor's website.
Vulnerable software versions
Cisco Nexus 9000 Series Switches in ACI Mode: before 4.2.0.167c
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190731-nxos-bo
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.