#VU19606 Buffer overflow in Cisco Nexus 9000 Series Switches in ACI Mode - CVE-2019-1901


Vulnerability identifier: #VU19606

Vulnerability risk: Medium

CVSSv4.0: 6.3 [CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Green]

CVE-ID: CVE-2019-1901

CWE-ID: CWE-119

Exploitation vector: Local network

Exploit availability: No

Vulnerable software:
Cisco Nexus 9000 Series Switches in ACI Mode
Hardware solutions / Routers & switches, VoIP, GSM, etc

Vendor: Cisco Systems, Inc

Description

The vulnerability allows an attacker to cause a denial of service (DoS) condition or execute arbitrary code with root privileges.

The vulnerability exists due to improper input validation of certain type, length, value (TLV) fields of the Link Layer Discovery Protocol (LLDP) frame header. An attacker can send a specially crafted LLDP packet to the targeted device, trigger memory corruption and cause a DoS condition or execute arbitrary code with root privileges.

Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.

Note: This vulnerability cannot be exploited by transit traffic through the device; the crafted packet must be targeted to a directly connected interface.

Mitigation
Install update from vendor's website.

Vulnerable software versions

Cisco Nexus 9000 Series Switches in ACI Mode: before 4.2.0.167c


External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190731-nxos-bo


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability