7.8

CVE-2018-0295

A vulnerability in the Border Gateway Protocol (BGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to the device unexpectedly reloading. The vulnerability is due to incomplete input validation of the BGP update messages. An attacker could exploit this vulnerability by sending a crafted BGP update message to the targeted device. An exploit could allow the attacker to cause the switch to reload unexpectedly. The Cisco implementation of the BGP protocol only accepts incoming BGP traffic from explicitly defined peers. To exploit this vulnerability, an attacker must be able to send the malicious packets over a TCP connection that appears to come from a trusted BGP peer or inject malformed messages into the victim's BGP network. This would require obtaining information about the BGP peers in the affected system's trusted network. The vulnerability may be triggered when the router receives a malformed BGP message from a peer on an existing BGP session. At least one BGP neighbor session must be established for a router to be vulnerable. This vulnerability affects Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules. Cisco Bug IDs: CSCve79599, CSCve87784, CSCve91371, CSCve91387.

Data is provided by the National Vulnerability Database (NVD)
CiscoNx-os Version >= 6.0 < 7.3\(3\)n1\(1\)
   CiscoNexus 5000 Version-
   CiscoNexus 5010 Version-
   CiscoNexus 5020 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5696q Version-
CiscoNx-os Version >= 6.2 < 8.1\(2\)
   CiscoNexus 7000 Version-
   CiscoNexus 7700 Version-
CiscoNx-os Version < 7.0\(3\)i3
   CiscoNexus 92160yc-x Version-
   CiscoNexus 92304qc Version-
   CiscoNexus 9236c Version-
   CiscoNexus 9272q Version-
   CiscoNexus 93108tc-ex Version-
   CiscoNexus 93120tx Version-
   CiscoNexus 93128tx Version-
   CiscoNexus 93180yc-ex Version-
   CiscoNexus 9332pq Version-
   CiscoNexus 9372px Version-
   CiscoNexus 9372tx Version-
   CiscoNexus 9396px Version-
   CiscoNexus 9396tx Version-
   CiscoNexus 9504 Version-
   CiscoNexus 9508 Version-
   CiscoNexus 9516 Version-
   CiscoNexus N9k-c9508-fm-r Version-
   CiscoNexus N9k-x9636c-r Version-
   CiscoNexus N9k-x9636q-r Version-
CiscoNx-os Version >= 7.0\(3\)i4 < 7.0\(3\)i7\(1\)
   CiscoNexus 92160yc-x Version-
   CiscoNexus 92304qc Version-
   CiscoNexus 9236c Version-
   CiscoNexus 9272q Version-
   CiscoNexus 93108tc-ex Version-
   CiscoNexus 93120tx Version-
   CiscoNexus 93128tx Version-
   CiscoNexus 93180yc-ex Version-
   CiscoNexus 9332pq Version-
   CiscoNexus 9372px Version-
   CiscoNexus 9372tx Version-
   CiscoNexus 9396px Version-
   CiscoNexus 9396tx Version-
   CiscoNexus 9504 Version-
   CiscoNexus 9508 Version-
   CiscoNexus 9516 Version-
   CiscoNexus N9k-c9508-fm-r Version-
   CiscoNexus N9k-x9636c-r Version-
   CiscoNexus N9k-x9636q-r Version-
CiscoNx-os Version < 7.0\(3\)i4
   CiscoNexus 172tq-xl Version-
   CiscoNexus 3016 Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064-32t Version-
   CiscoNexus 3064-t Version-
   CiscoNexus 3064-x Version-
   CiscoNexus 3100-v Version-
   CiscoNexus 31128pq Version-
   CiscoNexus 3132c-z Version-
   CiscoNexus 3132q Version-
   CiscoNexus 3132q-x Version-
   CiscoNexus 3132q-xl Version-
   CiscoNexus 3164q Version-
   CiscoNexus 3172pq Version-
   CiscoNexus 3172pq-xl Version-
   CiscoNexus 3172tq Version-
   CiscoNexus 3172tq-32t Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3264c-e Version-
   CiscoNexus 3264q Version-
   CiscoNexus 34180yc Version-
   CiscoNexus 3524-x Version-
   CiscoNexus 3524-xl Version-
   CiscoNexus 3548 Version-
   CiscoNexus 3548-x Version-
   CiscoNexus 3548-xl Version-
   CiscoNexus 3636c-r Version-
   CiscoNexus C36180yc-r Version-
CiscoNx-os Version >= 7.0\(3\)i5 < 7.0\(3\)i6\(2\)
   CiscoNexus 172tq-xl Version-
   CiscoNexus 3016 Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064-32t Version-
   CiscoNexus 3064-t Version-
   CiscoNexus 3064-x Version-
   CiscoNexus 3100-v Version-
   CiscoNexus 31128pq Version-
   CiscoNexus 3132c-z Version-
   CiscoNexus 3132q Version-
   CiscoNexus 3132q-x Version-
   CiscoNexus 3132q-xl Version-
   CiscoNexus 3164q Version-
   CiscoNexus 3172pq Version-
   CiscoNexus 3172pq-xl Version-
   CiscoNexus 3172tq Version-
   CiscoNexus 3172tq-32t Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3264c-e Version-
   CiscoNexus 3264q Version-
   CiscoNexus 34180yc Version-
   CiscoNexus 3524-x Version-
   CiscoNexus 3524-xl Version-
   CiscoNexus 3548 Version-
   CiscoNexus 3548-x Version-
   CiscoNexus 3548-xl Version-
   CiscoNexus 3636c-r Version-
   CiscoNexus C36180yc-r Version-
CiscoNx-os Version7.0(3)i7
   CiscoNexus 172tq-xl Version-
   CiscoNexus 3016 Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064-32t Version-
   CiscoNexus 3064-t Version-
   CiscoNexus 3064-x Version-
   CiscoNexus 3100-v Version-
   CiscoNexus 31128pq Version-
   CiscoNexus 3132c-z Version-
   CiscoNexus 3132q Version-
   CiscoNexus 3132q-x Version-
   CiscoNexus 3132q-xl Version-
   CiscoNexus 3164q Version-
   CiscoNexus 3172pq Version-
   CiscoNexus 3172pq-xl Version-
   CiscoNexus 3172tq Version-
   CiscoNexus 3172tq-32t Version-
   CiscoNexus 3232c Version-
   CiscoNexus 3264c-e Version-
   CiscoNexus 3264q Version-
   CiscoNexus 34180yc Version-
   CiscoNexus 3524-x Version-
   CiscoNexus 3524-xl Version-
   CiscoNexus 3548 Version-
   CiscoNexus 3548-x Version-
   CiscoNexus 3548-xl Version-
   CiscoNexus 3636c-r Version-
   CiscoNexus C36180yc-r Version-
CiscoNx-os Version >= 6.0 < 7.3\(3\)n1\(1\)
   CiscoNexus 6001p Version-
   CiscoNexus 6001t Version-
CiscoNx-os Version7.0
   CiscoNexus 9500 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 0.73% 0.719
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 7.8 10 6.9
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.