CVE-2019-1598

Published on: 03/07/2019 12:00:00 AM UTC

Last Modified on: 03/23/2021 11:27:48 PM UTC

CVE-2019-1598 - advisory for cisco-sa-20190306-nxosldap

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Certain versions of Firepower 4100 from Cisco contain the following vulnerability:

Multiple vulnerabilities in the implementation of the Lightweight Directory Access Protocol (LDAP) feature in Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of LDAP packets by an affected device. An attacker could exploit these vulnerabilities by sending an LDAP packet crafted using Basic Encoding Rules (BER) to an affected device. The LDAP packet must have a source IP address of an LDAP server configured on the targeted device. A successful exploit could cause the affected device to reload, resulting in a DoS condition. Firepower 4100 Series Next-Generation Firewalls are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. Firepower 9300 Security Appliances are affected in versions prior to 2.0.1.201, 2.2.2.54, and 2.3.1.75. MDS 9000 Series Multilayer Switches are affected in versions prior to 8.2(1). Nexus 3000 Series Switches are affected in versions prior to 7.0(3)I7(1). Nexus 3500 Platform Switches are affected in versions prior to 7.0(3)I7(2). Nexus 7000 and 7700 Series Switches are affected in versions prior to 6.2(20), 7.3(2)D1(1), and 8.2(1). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected in versions prior to 7.0(3)I7(1). UCS 6200 and 6300 Fabric Interconnect are affected in versions prior to 3.2(2b).

  • CVE-2019-1598 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as HIGH severity.
  • The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerabilities that are described in this advisory.

CVSS3 Score: 7.5 - HIGH

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE HIGH

CVSS2 Score: 7.8 - HIGH

Access
Vector
Access
Complexity
Authentication
NETWORK LOW NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE COMPLETE

CVE References

Description Tags Link
Cisco FXOS and NX-OS Lightweight Directory Access Protocol Denial of Service Vulnerabilities Patch
Vendor Advisory
tools.cisco.com
text/html
URL Logo CISCO 20190306 Cisco FXOS and NX-OS Lightweight Directory Access Protocol Denial of Service Vulnerabilities
Cisco FXOS and NX-OS System Software Multiple Denial of Service Vulnerabilities Third Party Advisory
VDB Entry
cve.report (archive)
text/html
URL Logo BID 107394

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Hardware Device InfoCiscoFirepower 4100-AllAllAll
Hardware Device InfoCiscoFirepower 4100-AllAllAll
Hardware Device InfoCiscoFirepower 9300-AllAllAll
Hardware Device InfoCiscoFirepower 9300-AllAllAll
Operating
System
CiscoFxosAllAllAllAll
Operating
System
CiscoFxosAllAllAllAll
Hardware Device InfoCiscoMds 9000-AllAllAll
Hardware Device InfoCiscoMds 9000-AllAllAll
Hardware Device InfoCiscoNexus 3000-AllAllAll
Hardware Device InfoCiscoNexus 3000-AllAllAll
Hardware Device InfoCiscoNexus 3500-AllAllAll
Hardware Device InfoCiscoNexus 3500-AllAllAll
Hardware Device InfoCiscoNexus 7000-AllAllAll
Hardware Device InfoCiscoNexus 7000-AllAllAll
Hardware Device InfoCiscoNexus 7700-AllAllAll
Hardware Device InfoCiscoNexus 7700-AllAllAll
Hardware Device InfoCiscoNexus 9000-AllAllAll
Hardware Device InfoCiscoNexus 9000-AllAllAll
Operating
System
CiscoNx-osAllAllAllAll
Operating
System
CiscoNx-osAllAllAllAll
Hardware Device InfoCiscoUcs 6200-AllAllAll
Hardware Device InfoCiscoUcs 6200-AllAllAll
Hardware Device InfoCiscoUcs 6300-AllAllAll
Hardware Device InfoCiscoUcs 6300-AllAllAll
  • cpe:2.3:h:cisco:firepower_4100:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_4100:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6200:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6200:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:*:
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report