Vulnerability identifier: #VU788
Vulnerability risk: Low
CVSSv4.0: 6.6 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID:
CWE-ID:
CWE-20
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco Nexus 1000 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Nexus 3000 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Nexus 3500 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Nexus 5000 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Nexus 2000 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Nexus 5600 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Nexus 7000 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Nexus 7700 Series Switches
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Nexus 9000 Series Switches in ACI Mode
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Cisco Nexus 9000 Series Switches NX-OS Mode
Hardware solutions /
Routers & switches, VoIP, GSM, etc
Vendor: Cisco Systems, Inc
Description
The vulnerability allows a remote unauthenticated user to cause DoS conditions on the target system.
The weakness is caused by insufficient input validation of the BGP update messages. By sending such massages attackers can cause the affected device reload.
Successful exploitation of the vulnerability results in denial of service on the vulnerable system.
Mitigation
Update Cisco Nexus 1000 Series Switches to 5.2(1)SV3(1.15).
Update Cisco Nexus 3000 Series Switches to 6.0(2)U6(7) or 7.0(3)I4(1).
Update Cisco Nexus 3500 Series Switches to 6.0(2)A8(1).
Update Cisco Nexus 2000, 5500, 6000 Series Switches to 7.1(4)N1(1), 7.2(2)N1(1) or 7.3(0)N1(1).
Update Cisco Nexus 7000, 7700Series Switches to 7.2(2)D1(1) or 7.3(1)D1(1).
Update Cisco Nexus 9000 Series Switches in ACI Mode to 11.1(1j).
Update Cisco Nexus 9000 Series Switches in NX-OS Mode to 7.0(3)I4(1)
Vulnerable software versions
Cisco Nexus 1000 Series Switches: 4.2 - 5.2
Cisco Nexus 3000 Series Switches: 6.0 - 7.0
Nexus 3500 Series Switches: 6.0
Cisco Nexus 5000 Series Switches: 5.1 - 5.2
Cisco Nexus 2000 Series Switches: 5.2 - 7.3
Cisco Nexus 5600 Series Switches: 5.2 - 7.3
Cisco Nexus 7000 Series Switches: 5.0 - 7.3
Cisco Nexus 7700 Series Switches: 5.0 - 7.3
Cisco Nexus 9000 Series Switches in ACI Mode: 11.0 - 11.1
Cisco Nexus 9000 Series Switches NX-OS Mode: 6.1 - 7.0
External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161005-bgp
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.