First published: Thu Jun 21 2018(Updated: )
A vulnerability in the Cisco Discovery Protocol (formerly known as CDP) subsystem of devices running, or based on, Cisco NX-OS Software contain a vulnerability that could allow an unauthenticated, adjacent attacker to create a denial of service (DoS) condition. The vulnerability is due to a failure to properly validate certain fields within a Cisco Discovery Protocol message prior to processing it. An attacker with the ability to submit a Cisco Discovery Protocol message designed to trigger the issue could cause a DoS condition on an affected device while the device restarts. This vulnerability affects Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Director Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvc89242, CSCve40943, CSCve40953, CSCve40965, CSCve40970, CSCve40978, CSCve40992, CSCve41000, CSCve41007.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | >=7.1<7.1\(5\)n1\(1\) | |
Cisco NX-OS | >=7.3<7.3\(3\)n1\(1\) | |
Cisco NX-OS | =6.0 | |
Cisco NX-OS | =7.0 | |
Cisco NX-OS | =7.2 | |
Cisco Nexus 5000 firmware | ||
Cisco Nexus 5010 | ||
Cisco Nexus 5020 | ||
Cisco Nexus 5548P Firmware | ||
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596T Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco 56128p | ||
Cisco Nexus 5624Q Firmware | ||
Cisco Nexus 5648Q Firmware | ||
Cisco Nexus 5672UP-16G | ||
Cisco Nexus 5696Q Firmware | ||
Cisco NX-OS | >=6.2<6.2\(20\) | |
Cisco NX-OS | >=7.2<7.2\(2\)d1\(3\) | |
Cisco NX-OS | >=7.3<7.3\(2\)d1\(1\) | |
Cisco NX-OS | >=8.1<8.1\(2\) | |
Cisco NX-OS | >=8.2<8.2\(1\) | |
Cisco NX-OS | =8.0 | |
Cisco Nexus 7000 | ||
Cisco Nexus 7700 series | ||
Cisco NX-OS | <7.0\(3\)i3 | |
Cisco NX-OS | >=7.0\(3\)i4<7.0\(3\)i7\(1\) | |
Cisco Nexus 92160YC Switch | ||
Cisco Nexus 92304QC Switch | ||
Cisco Nexus 9236C Switch | ||
Cisco Nexus 9272Q Switch | ||
Cisco Nexus | ||
Cisco Nexus 93120TX Firmware | ||
Cisco Nexus 93128 Firmware | ||
Cisco Nexus 93180YC-EX-24 | ||
Cisco Nexus 9332PQ Firmware | ||
Cisco Nexus 9372PX-E | ||
Cisco Nexus 9372TX | ||
Cisco Nexus 9396PX Firmware | ||
Cisco Nexus 9396TX Firmware | ||
Cisco Nexus 9504 firmware | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 firmware | ||
Cisco Nexus 9508 | ||
Cisco x9636q-r | ||
Cisco Nexus X9636Q-R | ||
Cisco NX-OS | <7.0\(3\)i7\(1\) | |
Cisco Nexus 172tq-xl | ||
Cisco Nexus 3016Q Firmware | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064x | ||
Cisco Nexus 3100V Firmware | ||
Cisco Nexus 31128PQ | ||
Cisco Nexus 3132C-Z Firmware | ||
Cisco Nexus 3132Q-XL | ||
Cisco Nexus 3132Q-X/3132Q-XL | ||
Cisco Nexus 3132Q-XL Firmware | ||
Cisco Nexus 3164Q Firmware | ||
Cisco Nexus 3172PQ/PQ-XL | ||
Cisco Nexus 3172PQ-XL Firmware | ||
Cisco Nexus 3172TQ Firmware | ||
Cisco Nexus 3172TQ-XL | ||
Cisco Nexus 3232C | ||
Cisco Nexus 3264C-E Firmware | ||
Cisco Nexus 3264Q Firmware | ||
Cisco Nexus 34180YC Firmware | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3524-XL Firmware | ||
Cisco Nexus 3548-X/XL Firmware | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3548-X/XL | ||
Cisco Nexus 3636C-R Firmware | ||
Cisco Nexus 36180YC-R | ||
Cisco NX-OS | >=6.0<7.3\(3\)n1\(1\) | |
Cisco Nexus 6001P Firmware | ||
Cisco Nexus 6001T Firmware | ||
Cisco NX-OS | >=5.2<8.1\(1a\) | |
Cisco MDS 9000 Series Multilayer Switches | ||
Cisco NX-OS | <2.2\(8g\) | |
Cisco NX-OS | >=2.5<3.1\(2f\) | |
Cisco UCS 6120xp | ||
Cisco UCS 6140xp | ||
Cisco UCS 6248UP | ||
Cisco UCS 6296UP | ||
Cisco UCS 6324 firmware | ||
Cisco UCS 6332 | ||
Cisco Firepower Extensible Operating System | >=1.1<2.0.1.153 | |
Cisco Firepower Extensible Operating System | >=2.1.1<2.1.1.86 | |
Cisco Firepower Extensible Operating System | >=2.2.1<2.2.1.70 | |
Cisco FX-OS | >=2.2.2<2.2.2.14 | |
Cisco Firepower 4110 Next-Generation Firewall | ||
Cisco Firepower 4120 Next-Generation Firewall | ||
Cisco Firepower 4140 Next-Generation Firewall | ||
Cisco Firepower 4150 Next-Generation Firewall | ||
Cisco FX-OS | >=1.1<2.0.1.152 | |
Cisco Firepower 9300 Security Appliances |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2018-0331 is classified as high due to its potential to cause denial of service (DoS) conditions.
To fix CVE-2018-0331, update your Cisco NX-OS to a version that is not affected by this vulnerability.
CVE-2018-0331 affects devices running certain versions of Cisco NX-OS, particularly those prior to the fixed releases.
CVE-2018-0331 can be exploited by unauthenticated adjacent attackers to create a denial of service condition.
There are no specific workarounds for CVE-2018-0331; patching to a secure version is recommended.