Cisco NX-OS Software denial of service | CVE-2022-20823
NAME
Cisco NX-OS Software denial of service
- Platforms Affected:
Cisco Nexus 3000 Series Switches
Cisco Nexus 6000 Series Switches
Cisco Nexus 7000 Series Switches
Cisco Nexus 5500 Platform Switches
Cisco Nexus 5600 Platform Switches
Cisco NX-OS Software
Cisco Nexus 9000 Series Switches in standalone NX-OS mode
Cisco Nexus 9000 Series Fabric Switches in ACI mode - Risk Level:
8.6 - Exploitability:
Unproven - Consequences:
Denial of Service
DESCRIPTION
Cisco NX-OS Software is vulnerable to a denial of service, caused by improper input validation of specific OSPFv3 packets. By sending a specially-crafted OSPFv3 link-state advertisement (LSA), a remote attacker could exploit this vulnerability to cause the OSPFv3 process to crash and restart multiple times.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Refer to Cisco Security Advisory cisco-sa-nxos-ospfv3-dos-48qutcu for patch, upgrade or suggested workaround information. See References.
- Reference Link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ospfv3-dos-48qutcu - Reference Link:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20823
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon using the button below
To keep up to date follow us on the below channels.