First published: Thu Aug 10 2017(Updated: )
The implementation of the OSPF protocol in VMware NSX-V Edge 6.2.x prior to 6.2.8 and NSX-V Edge 6.3.x prior to 6.3.3 doesn't correctly handle the link-state advertisement (LSA). A rogue LSA may exploit this issue resulting in continuous sending of LSAs between two routers eventually going in loop or loss of connectivity.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware NSX-V Edge | >=6.2.0<6.2.8 | |
VMware NSX-V Edge | >=6.3.0<6.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-4920 is considered to have a high severity due to the potential for exploitation through rogue link-state advertisements.
To fix CVE-2017-4920, you should update VMware NSX-V Edge to version 6.2.8 or 6.3.3 or later.
VMware NSX-V Edge versions 6.2.0 through 6.2.7 and 6.3.0 through 6.3.2 are affected by CVE-2017-4920.
CVE-2017-4920 enables a potential denial-of-service attack due to a loop in link-state advertisements between affected routers.
There are no documented workarounds for CVE-2017-4920; upgrading to the fixed version is the recommended course of action.