You are here
Home > Preporuke > Ranjivost Cisco FXOS, Cisco NX-OS i Cisco UCS Manager softvera

Ranjivost Cisco FXOS, Cisco NX-OS i Cisco UCS Manager softvera

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco FXOS, NX-OS, and UCS Manager Software Cisco Discovery Protocol Denial of Service Vulnerability

Advisory ID: cisco-sa-20180620-nxos-cdp

Revision: 1.0

For Public Release: 2018 June 20 16:00 GMT

Last Updated: 2018 June 20 16:00 GMT

CVE ID(s): CVE-2018-0331

CVSS Score v(3): 7.4 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary

=======

A vulnerability in the Cisco Discovery Protocol (formerly known as CDP) subsystem of devices running, or based on, Cisco NX-OS Software contain a vulnerability that could allow an unauthenticated, adjacent attacker to create a denial of service (DoS) condition.

The vulnerability is due to a failure to properly validate certain fields within a Cisco Discovery Protocol message prior to processing it. An attacker with the ability to submit a Cisco Discovery Protocol message designed to trigger the issue could cause a DoS condition on an affected device while the device restarts.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:

https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxos-cdp [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxos-cdp”]

This advisory is part of the June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection, which includes 24 Cisco Security Advisories that describe 24 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2018 Cisco FXOS and NX-OS Software Security Advisory Collection [“https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-67770”].

—–BEGIN PGP SIGNATURE—–
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=tvgG
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorZvonimir Bosnjak
Cert idNCERT-REF-2018-06-0001-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
IzvorAdobe
Top
More in Preporuke
Ranjivost Cisco NX-OS softvera

Otkrivena je ranjivost sučelja za upravljanje NX-API-ja kod uređaja koji koriste ili se temelje na Cisco NX-OS softveru. Ranjivost je...

Close