First published: Wed Oct 17 2018(Updated: )
A vulnerability in the Precision Time Protocol (PTP) feature of Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of protection against PTP frame flood attacks. An attacker could exploit this vulnerability by sending large streams of malicious IPv4 or IPv6 PTP traffic to the affected device. A successful exploit could allow the attacker to cause a DoS condition, impacting the traffic passing through the device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | =7.3\(2\)n1\(0.8\) | |
Cisco Nexus 5548p | ||
Cisco Nexus 5548up | ||
Cisco Nexus 5596t | ||
Cisco Nexus 5596up | ||
Cisco Nexus 56128p | ||
Cisco Nexus 5624q | ||
Cisco Nexus 5648q | ||
Cisco Nexus 5672up | ||
Cisco Nexus 5672up-16g | ||
Cisco Nexus 5696q | ||
Cisco Nexus 6001 | ||
Cisco Nexus 6004 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0378 is a vulnerability in the Precision Time Protocol (PTP) feature of Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.
CVE-2018-0378 affects Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software.
CVE-2018-0378 has a severity rating of 8.6 (high).
An attacker can exploit CVE-2018-0378 by sending specially crafted Precision Time Protocol (PTP) packets to the affected device.
Yes, Cisco has released a security advisory with mitigation steps for CVE-2018-0378.