First published: Thu Apr 25 2013(Updated: )
Multiple buffer overflows in the Cisco Discovery Protocol (CDP) implementation in Cisco NX-OS on Nexus 7000 devices 4.x and 5.x before 5.2(4) and 6.x before 6.1(1), Nexus 5000 and 5500 devices 4.x and 5.x before 5.1(3)N1(1), Nexus 4000 devices before 4.1(2)E1(1h), Nexus 3000 devices 5.x before 5.0(3)U3(1), Nexus 1000V devices 4.x before 4.2(1)SV1(5.1), MDS 9000 devices 4.x and 5.x before 5.2(4), Unified Computing System (UCS) 6100 and 6200 devices before 2.0(2m), and Connected Grid Router (CGR) 1000 devices before CG4(1) allow remote attackers to execute arbitrary code via malformed CDP packets, aka Bug IDs CSCtu10630, CSCtu10551, CSCtu10550, CSCtw56581, CSCtu10548, CSCtu10544, and CSCuf61275.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =4.0 | |
Cisco NX-OS | =4.0\(0\)n1\(1a\) | |
Cisco NX-OS | =4.0\(0\)n1\(2\) | |
Cisco NX-OS | =4.0\(0\)n1\(2a\) | |
Cisco NX-OS | =4.0\(1a\)n1\(1\) | |
Cisco NX-OS | =4.0\(1a\)n1\(1a\) | |
Cisco NX-OS | =4.0\(1a\)n2\(1\) | |
Cisco NX-OS | =4.0\(1a\)n2\(1a\) | |
Cisco NX-OS | =4.0\(4\)sv1\(1\) | |
Cisco NX-OS | =4.0\(4\)sv1\(2\) | |
Cisco NX-OS | =4.0\(4\)sv1\(3\) | |
Cisco NX-OS | =4.0\(4\)sv1\(3a\) | |
Cisco NX-OS | =4.0\(4\)sv1\(3b\) | |
Cisco NX-OS | =4.0\(4\)sv1\(3c\) | |
Cisco NX-OS | =4.0\(4\)sv1\(3d\) | |
Cisco NX-OS | =4.1\(3\)n1\(1\) | |
Cisco NX-OS | =4.1\(3\)n1\(1a\) | |
Cisco NX-OS | =4.1\(3\)n2\(1\) | |
Cisco NX-OS | =4.1\(3\)n2\(1a\) | |
Cisco NX-OS | =4.1.\(2\) | |
Cisco NX-OS | =4.1.\(3\) | |
Cisco NX-OS | =4.1.\(4\) | |
Cisco NX-OS | =4.1.\(5\) | |
Cisco NX-OS | =4.2 | |
Cisco NX-OS | =4.2\(1\) | |
Cisco NX-OS | =4.2\(1\)n1\(1\) | |
Cisco NX-OS | =4.2\(1\)n2\(1\) | |
Cisco NX-OS | =4.2\(1\)n2\(1a\) | |
Cisco NX-OS | =4.2\(1\)sv1\(4\) | |
Cisco NX-OS | =4.2\(1\)sv1\(4a\) | |
Cisco NX-OS | =4.2\(1\)sv1\(5.1\) | |
Cisco NX-OS | =4.2\(2\) | |
Cisco NX-OS | =4.2\(3\) | |
Cisco NX-OS | =4.2\(4\) | |
Cisco NX-OS | =4.2\(6\) | |
Cisco NX-OS | =4.2\(8\) | |
Cisco NX-OS | =4.2.\(2a\) | |
Cisco NX-OS | =5.0 | |
Cisco NX-OS | =5.0\(2\) | |
Cisco NX-OS | =5.0\(2\)n1\(1\) | |
Cisco NX-OS | =5.0\(2\)n2\(1\) | |
Cisco NX-OS | =5.0\(2\)n2\(1a\) | |
Cisco NX-OS | =5.0\(2a\) | |
Cisco NX-OS | =5.0\(3\) | |
Cisco NX-OS | =5.0\(3\)n1\(1\) | |
Cisco NX-OS | =5.0\(3\)n1\(1a\) | |
Cisco NX-OS | =5.0\(3\)n1\(1b\) | |
Cisco NX-OS | =5.0\(3\)n1\(1c\) | |
Cisco NX-OS | =5.0\(3\)n2\(1\) | |
Cisco NX-OS | =5.0\(3\)n2\(2\) | |
Cisco NX-OS | =5.0\(3\)n2\(2a\) | |
Cisco NX-OS | =5.0\(3\)n2\(2b\) | |
Cisco NX-OS | =5.0\(5\) | |
Cisco NX-OS | =5.1 | |
Cisco NX-OS | =5.1\(1\) | |
Cisco NX-OS | =5.1\(1a\) | |
Cisco NX-OS | =5.1\(2\) | |
Cisco NX-OS | =5.1\(3\) | |
Cisco NX-OS | =5.1\(3\)n1\(1\) | |
Cisco NX-OS | =5.1\(3\)n1\(1a\) | |
Cisco NX-OS | =5.1\(4\) | |
Cisco NX-OS | =5.1\(5\) | |
Cisco NX-OS | =5.1\(6\) | |
Cisco NX-OS | =5.2 | |
Cisco NX-OS | =5.2\(1\) | |
Cisco NX-OS | =5.2\(3\) | |
Cisco NX-OS | =5.2\(3a\) | |
Cisco NX-OS | =6.0\(1\) | |
Cisco NX-OS | =6.0\(2\) | |
Cisco NX-OS | =6.1 | |
Cisco Nexus 7000 | ||
Cisco Nexus 7000 | ||
Cisco Nexus 7000 | ||
Cisco Nexus 7000 9-Slot Firmware | ||
Cisco MDS 9000 Series Multilayer Switches | ||
Cisco Nexus 5000 firmware | ||
Cisco Nexus 5010 | ||
Cisco Nexus 5020 | ||
Cisco Nexus 5548P Firmware | ||
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco NX-OS | <=4.1.\(2\) | |
Cisco Nexus 4001i | ||
Cisco Nexus 3000 | ||
Cisco Nexus 3016Q Firmware | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064-X Firmware | ||
Cisco Nexus 3548-X/XL Firmware | ||
Cisco Nexus 1000V for Hyper-V | ||
Cisco Unified Computing System | <=2.0\(1x\) | |
Cisco Unified Computing System | =1.0 | |
Cisco Unified Computing System | =1.0\(2k\) | |
Cisco Unified Computing System | =1.1 | |
Cisco Unified Computing System | =1.1\(1m\) | |
Cisco Unified Computing System | =1.2 | |
Cisco Unified Computing System | =1.2\(1\) | |
Cisco Unified Computing System | =1.2\(1a\) | |
Cisco Unified Computing System | =1.2\(1d\) | |
Cisco Unified Computing System | =1.3\(1c\) | |
Cisco Unified Computing System | =1.3\(1m\) | |
Cisco Unified Computing System | =1.3\(1n\) | |
Cisco Unified Computing System | =1.3\(1o\) | |
Cisco Unified Computing System | =1.3\(1p\) | |
Cisco Unified Computing System | =1.3\(1q\) | |
Cisco Unified Computing System | =1.3\(1t\) | |
Cisco Unified Computing System | =1.3\(1w\) | |
Cisco Unified Computing System | =1.3\(1y\) | |
Cisco Unified Computing System | =1.4\(1j\) | |
Cisco Unified Computing System | =1.4\(1m\) | |
Cisco Unified Computing System | =1.4\(3i\) | |
Cisco Unified Computing System | =1.4\(3l\) | |
Cisco Unified Computing System | =1.4\(3m\) | |
Cisco Unified Computing System | =1.4\(3q\) | |
Cisco Unified Computing System | =1.4\(3s\) | |
Cisco Unified Computing System | =1.4\(3u\) | |
Cisco Unified Computing System | =1.4\(3y\) | |
Cisco Unified Computing System | =1.4\(4f\) | |
Cisco Unified Computing System | =1.4\(4g\) | |
Cisco Unified Computing System | =1.4\(4i\) | |
Cisco Unified Computing System | =1.4\(4j\) | |
Cisco Unified Computing System | =1.4\(4k\) | |
Cisco Unified Computing System | =2.0\(1q\) | |
Cisco Unified Computing System | =2.0\(1s\) | |
Cisco Unified Computing System | =2.0\(1t\) | |
Cisco Unified Computing System | =2.0\(1w\) | |
Cisco Unified Computing System 6120xp Fabric Interconnect | ||
Cisco Unified Computing System 6140xp Fabric Interconnect | ||
Cisco UCS 6248UP Fabric Interconnect | ||
Cisco UCS 6296UP Fabric Interconnect | ||
Cisco CG-OS | <=cg4 | |
Cisco CG-OS | =cg1 | |
Cisco CG-OS | =cg2 | |
Cisco CG-OS | =cg3 | |
Cisco 1000 Series Connected Grid Routers |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2013-1178 is high due to multiple buffer overflow vulnerabilities in the Cisco Discovery Protocol implementation.
To fix CVE-2013-1178, upgrade to the appropriate patched version of Cisco NX-OS as recommended in the security advisory.
CVE-2013-1178 affects a variety of Cisco Nexus devices, including the Nexus 7000, 5000, 5500, 4000, and 3000 series running specific versions of NX-OS.
Yes, CVE-2013-1178 is remotely exploitable, allowing an attacker to execute arbitrary code under certain conditions.
Mitigations include properly configuring access control lists (ACLs) to limit access to affected devices until the software is patched.