First published: Wed Mar 06 2019(Updated: )
A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow, resulting in process crashes and a DoS condition on the device. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25), 8.1(1b), 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5) Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). UCS 6200, 6300, and 6400 Fabric Interconnects are affected running software versions prior to 3.2(3j) and 4.0(2a).
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | >=8.2<8.3\(1\) | |
Cisco MDS 9000 | ||
Cisco Nx-os | >=7.0\(3\)<7.0\(3\)i7\(4\) | |
Cisco Nexus 3500 | ||
Cisco Nx-os | >=7.0\(3\)i5<7.0\(3\)i7\(4\) | |
Cisco Nexus 3000 | ||
Cisco Nx-os | >=7.0\(3\)f3<7.0\(3\)f3\(3c\) | |
Cisco Nexus 3600 | ||
Cisco Nx-os | >=7.2<8.2\(3\) | |
Cisco Nexus 7000 | ||
Cisco Nexus 7700 | ||
Cisco Nexus 9000 | ||
Cisco Nx-os | >=7.0\(3\)f1<7.0\(3\)f3\(3c\) | |
Cisco Nexus 9500 | ||
Cisco Nx-os | >=7.3<8.1\(1b\) | |
Cisco Nx-os | >=5.2<6.2\(25\) | |
Cisco Nx-os | >=7.0\(3\)i4<7.0\(3\)i4\(9\) | |
Cisco Nx-os | >=6.2<6.2\(22\) | |
Cisco Nx-os | <6.2\(22\) | |
Cisco Nx-os | <7.0\(3\)i4\(9\) | |
Cisco Nx-os | >=6.0\(2\)a8<6.0\(2\)a8\(10\) | |
Cisco Nx-os | <=6.0\(2\)a8 | |
Cisco Nx-os | <=7.0\(3\)i4 | |
Cisco Nx-os | >=4.0<4.0\(2a\) | |
Cisco UCS 6200 | ||
Cisco Ucs 6300 | ||
Cisco Ucs 6400 | ||
Cisco Nx-os | <3.2\(3j\) | |
All of | ||
Cisco Nx-os | >=8.2<8.3\(1\) | |
Cisco MDS 9000 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)<7.0\(3\)i7\(4\) | |
Cisco Nexus 3500 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)i5<7.0\(3\)i7\(4\) | |
Cisco Nexus 3000 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)f3<7.0\(3\)f3\(3c\) | |
Cisco Nexus 3600 | ||
All of | ||
Cisco Nx-os | >=7.2<8.2\(3\) | |
Any of | ||
Cisco Nexus 7000 | ||
Cisco Nexus 7700 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)i5<7.0\(3\)i7\(4\) | |
Cisco Nexus 9000 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)f1<7.0\(3\)f3\(3c\) | |
Cisco Nexus 9500 | ||
All of | ||
Cisco Nx-os | >=7.3<8.1\(1b\) | |
Cisco MDS 9000 | ||
All of | ||
Cisco Nx-os | >=5.2<6.2\(25\) | |
Cisco MDS 9000 | ||
All of | ||
Cisco Nx-os | >=7.0\(3\)i4<7.0\(3\)i4\(9\) | |
Cisco Nexus 3000 | ||
All of | ||
Cisco Nx-os | >=6.2<6.2\(22\) | |
Any of | ||
Cisco Nexus 7000 | ||
Cisco Nexus 7700 | ||
All of | ||
Cisco Nx-os | <6.2\(22\) | |
Any of | ||
Cisco Nexus 7000 | ||
Cisco Nexus 7700 | ||
All of | ||
Cisco Nx-os | <7.0\(3\)i4\(9\) | |
Cisco Nexus 9000 | ||
All of | ||
Cisco Nx-os | >=6.0\(2\)a8<6.0\(2\)a8\(10\) | |
Cisco Nexus 3500 | ||
All of | ||
Cisco Nx-os | <=6.0\(2\)a8 | |
Cisco Nexus 3500 | ||
All of | ||
Cisco Nx-os | <=7.0\(3\)i4 | |
Cisco Nexus 3000 | ||
All of | ||
Cisco Nx-os | >=4.0<4.0\(2a\) | |
Any of | ||
Cisco UCS 6200 | ||
Cisco Ucs 6300 | ||
Cisco Ucs 6400 | ||
All of | ||
Cisco Nx-os | <3.2\(3j\) | |
Any of | ||
Cisco UCS 6200 | ||
Cisco Ucs 6300 | ||
Cisco Ucs 6400 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.