QID 317418
Date Published: 2024-03-07
QID 317418: Cisco Nexus Operating System (NX-OS) Software Multiprotocol Label Switching (MPLS) Encapsulated Internet Protocol (IPv6) Denial of Service (DoS) Vulnerability (cisco-sa-ipv6-mpls-dos-R9ycXkwM)
A vulnerability with the handling of MPLS traffic for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the netstack process to unexpectedly restart, which could cause the device to stop processing network traffic or to reload.
Note: The IPv6 packet can be generated multiple hops away from the targeted device and then encapsulated within MPLS. The DoS condition may occur when the NX-OS device processes the packet.
Affected Products
This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco NX-OS Software and have MPLS configured:
Nexus 3000 Series Switches (CSCwh42690)
Nexus 5500 Platform Switches (CSCva52387)
Nexus 5600 Platform Switches (CSCva52387)
Nexus 6000 Series Switches (CSCva52387)
Nexus 7000 Series Switches (CSCva52387)
Nexus 9000 Series Switches in standalone NX-OS mode (CSCwh42690)
Note: If the show mpls interface detail is not a valid CLI command on the device, the device can be considered not vulnerable.
QID Detection Logic(Authenticated):
It checks for vulnerable version of Cisco NX-OS using show version Command.
A successful exploit could allow the attacker to cause a denial of service (DoS) condition.
Customers are advised to refer to cisco-sa-ipv6-mpls-dos-R9ycXkwM for more information.
- cisco-sa-ipv6-mpls-dos-R9ycXkwM -
sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv6-mpls-dos-R9ycXkwM
CVEs related to QID 317418
| Advisory ID | Software | Component | Link |
|---|---|---|---|
| cisco-sa-ipv6-mpls-dos-R9ycXkwM |
|