First published: Wed Oct 17 2018(Updated: )
A vulnerability in the Precision Time Protocol (PTP) feature of Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of protection against PTP frame flood attacks. An attacker could exploit this vulnerability by sending large streams of malicious IPv4 or IPv6 PTP traffic to the affected device. A successful exploit could allow the attacker to cause a DoS condition, impacting the traffic passing through the device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =7.3\(2\)n1\(0.8\) | |
Cisco Nexus 5548P Firmware | ||
Cisco Nexus 5548UP Firmware | ||
Cisco Nexus 5596T Firmware | ||
Cisco Nexus 5596UP Firmware | ||
Cisco 56128p | ||
Cisco Nexus 5624Q Firmware | ||
Cisco Nexus 5648Q Firmware | ||
Cisco Nexus 5672UP-16G | ||
Cisco Nexus 5672UP-16G Firmware | ||
Cisco Nexus 5696Q Firmware | ||
Cisco Nexus 6001 Firmware | ||
Cisco Nexus 6004 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0378 is a vulnerability in the Precision Time Protocol (PTP) feature of Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
CVE-2018-0378 affects Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software.
CVE-2018-0378 has a severity rating of 8.6 (high).
An attacker can exploit CVE-2018-0378 by sending specially crafted Precision Time Protocol (PTP) packets to the affected device.
Yes, Cisco has released a security advisory with mitigation steps for CVE-2018-0378.