7.4
CVE-2023-20169
- EPSS 0.07%
- Published 23.08.2023 19:15:07
- Last modified 21.11.2024 07:40:44
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco NX-OS Software for the Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload. This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the unexpected restart of the IS-IS process, which could cause the affected device to reload. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2 adjacent to the affected device.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Nx-os Version10.3(2)
Cisco ≫ Nexus 3048 Version-
Cisco ≫ Nexus 31108pc-v Version-
Cisco ≫ Nexus 31108tc-v Version-
Cisco ≫ Nexus 31128pq Version-
Cisco ≫ Nexus 3132c-z Version-
Cisco ≫ Nexus 3132q-v Version-
Cisco ≫ Nexus 3132q-xl Version-
Cisco ≫ Nexus 3164q Version-
Cisco ≫ Nexus 3172pq Version-
Cisco ≫ Nexus 3172pq-xl Version-
Cisco ≫ Nexus 3172tq Version-
Cisco ≫ Nexus 3172tq-32t Version-
Cisco ≫ Nexus 3172tq-xl Version-
Cisco ≫ Nexus 3232 Version-
Cisco ≫ Nexus 3264c-e Version-
Cisco ≫ Nexus 3264q Version-
Cisco ≫ Nexus 3408-s Version-
Cisco ≫ Nexus 34180yc Version-
Cisco ≫ Nexus 34200yc-sm Version-
Cisco ≫ Nexus 3432d-s Version-
Cisco ≫ Nexus 3464c Version-
Cisco ≫ Nexus 3524 Version-
Cisco ≫ Nexus 3524-x Version-
Cisco ≫ Nexus 3524-xl Version-
Cisco ≫ Nexus 3548 Version-
Cisco ≫ Nexus 3548-x Version-
Cisco ≫ Nexus 3548-xl Version-
Cisco ≫ Nexus 36180yc-r Version-
Cisco ≫ Nexus 9232e Version-
Cisco ≫ Nexus 92348gc-x Version-
Cisco ≫ Nexus 9408 Version-
Cisco ≫ Nexus 9504 Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Cisco ≫ Nexus 31108pc-v Version-
Cisco ≫ Nexus 31108tc-v Version-
Cisco ≫ Nexus 31128pq Version-
Cisco ≫ Nexus 3132c-z Version-
Cisco ≫ Nexus 3132q-v Version-
Cisco ≫ Nexus 3132q-xl Version-
Cisco ≫ Nexus 3164q Version-
Cisco ≫ Nexus 3172pq Version-
Cisco ≫ Nexus 3172pq-xl Version-
Cisco ≫ Nexus 3172tq Version-
Cisco ≫ Nexus 3172tq-32t Version-
Cisco ≫ Nexus 3172tq-xl Version-
Cisco ≫ Nexus 3232 Version-
Cisco ≫ Nexus 3264c-e Version-
Cisco ≫ Nexus 3264q Version-
Cisco ≫ Nexus 3408-s Version-
Cisco ≫ Nexus 34180yc Version-
Cisco ≫ Nexus 34200yc-sm Version-
Cisco ≫ Nexus 3432d-s Version-
Cisco ≫ Nexus 3464c Version-
Cisco ≫ Nexus 3524 Version-
Cisco ≫ Nexus 3524-x Version-
Cisco ≫ Nexus 3524-xl Version-
Cisco ≫ Nexus 3548 Version-
Cisco ≫ Nexus 3548-x Version-
Cisco ≫ Nexus 3548-xl Version-
Cisco ≫ Nexus 36180yc-r Version-
Cisco ≫ Nexus 9232e Version-
Cisco ≫ Nexus 92348gc-x Version-
Cisco ≫ Nexus 9408 Version-
Cisco ≫ Nexus 9504 Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.07% | 0.212 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 7.4 | 2.8 | 4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
psirt@cisco.com | 7.4 | 2.8 | 4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.
CWE-788 Access of Memory Location After End of Buffer
The product reads or writes to a buffer using an index or pointer that references a memory location after the end of the buffer.