8.6
Advisory Published
Updated

CVE-2019-1616

First published: Mon Mar 11 2019(Updated: )

A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a buffer overflow, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient validation of Cisco Fabric Services packets. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow, resulting in process crashes and a DoS condition on the device. MDS 9000 Series Multilayer Switches are affected running software versions prior to 6.2(25), 8.1(1b), 8.3(1). Nexus 3000 Series Switches are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 3500 Platform Switches are affected running software versions prior to 6.0(2)A8(10) and 7.0(3)I7(4). Nexus 3600 Platform Switches are affected running software versions prior to 7.0(3)F3(5) Nexus 7000 and 7700 Series Switches are affected running software versions prior to 6.2(22) and 8.2(3). Nexus 9000 Series Switches in Standalone NX-OS Mode are affected running software versions prior to 7.0(3)I4(9) and 7.0(3)I7(4). Nexus 9500 R-Series Line Cards and Fabric Modules are affected running software versions prior to 7.0(3)F3(5). UCS 6200, 6300, and 6400 Fabric Interconnects are affected running software versions prior to 3.2(3j) and 4.0(2a).

Credit: ykramarz@cisco.com

Affected SoftwareAffected VersionHow to fix
Cisco Nx-os>=8.2<8.3\(1\)
Cisco MDS 9000
Cisco Nx-os>=7.0\(3\)<7.0\(3\)i7\(4\)
Cisco Nexus 3500
Cisco Nx-os>=7.0\(3\)i5<7.0\(3\)i7\(4\)
Cisco Nexus 3000
Cisco Nx-os>=7.0\(3\)f3<7.0\(3\)f3\(3c\)
Cisco Nexus 3600
Cisco Nx-os>=7.2<8.2\(3\)
Cisco Nexus 7000
Cisco Nexus 7700
Cisco Nexus 9000
Cisco Nx-os>=7.0\(3\)f1<7.0\(3\)f3\(3c\)
Cisco Nexus 9500
Cisco Nx-os>=7.3<8.1\(1b\)
Cisco Nx-os>=5.2<6.2\(25\)
Cisco Nx-os>=7.0\(3\)i4<7.0\(3\)i4\(9\)
Cisco Nx-os>=6.2<6.2\(22\)
Cisco Nx-os<6.2\(22\)
Cisco Nx-os<7.0\(3\)i4\(9\)
Cisco Nx-os>=6.0\(2\)a8<6.0\(2\)a8\(10\)
Cisco Nx-os<=6.0\(2\)a8
Cisco Nx-os<=7.0\(3\)i4
Cisco Nx-os>=4.0<4.0\(2a\)
Cisco UCS 6200
Cisco Ucs 6300
Cisco Ucs 6400
Cisco Nx-os<3.2\(3j\)

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2024 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203