First published: Thu Aug 27 2020(Updated: )
A vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a BGP session to repeatedly reset, causing a partial denial of service (DoS) condition due to the BGP session being down. The vulnerability is due to incorrect parsing of a specific type of BGP MVPN update message. An attacker could exploit this vulnerability by sending this BGP MVPN update message to a targeted device. A successful exploit could allow the attacker to cause the BGP peer connections to reset, which could lead to BGP route instability and impact traffic. The incoming BGP MVPN update message is valid but is parsed incorrectly by the NX-OS device, which could send a corrupted BGP update to the configured BGP peer. Note: The Cisco implementation of BGP accepts incoming BGP traffic from only explicitly configured peers. To exploit this vulnerability, an attacker must send a specific BGP MVPN update message over an established TCP connection that appears to come from a trusted BGP peer. To do so, the attacker must obtain information about the BGP peers in the trusted network of the affected system.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | ||
Cisco Nexus 3016 | ||
Cisco Nexus 3048 | ||
Cisco Nexus 3064 | ||
Cisco Nexus 3064-t | ||
Cisco Nexus 31108pc-v | ||
Cisco Nexus 31108tc-v | ||
Cisco Nexus 31128pq | ||
Cisco Nexus 3132c-z | ||
Cisco Nexus 3132q | ||
Cisco Nexus 3132q-v | ||
Cisco Nexus 3132q-xl | ||
Cisco Nexus 3164q | ||
Cisco Nexus 3172 | ||
Cisco Nexus 3172pq-xl | ||
Cisco Nexus 3172tq | ||
Cisco Nexus 3172tq-32t | ||
Cisco Nexus 3172tq-xl | ||
Cisco Nexus 3232c | ||
Cisco Nexus 3264c-e | ||
Cisco Nexus 3264q | ||
Cisco Nexus 3408-s | ||
Cisco Nexus 34180yc | ||
Cisco Nexus 3432d-s | ||
Cisco Nexus 3464c | ||
Cisco Nexus 3524 | ||
Cisco Nexus 3524-x | ||
Cisco Nexus 3524-xl | ||
Cisco Nexus 3548 | ||
Cisco Nexus 3548-x | ||
Cisco Nexus 3548-xl | ||
Cisco Nexus 36180yc-r | ||
Cisco Nexus 3636c-r | ||
Cisco Nexus 7000 | ||
Cisco Nexus 7700 | ||
Cisco Nexus 9000v | ||
Cisco Nexus 92160yc-x | ||
Cisco Nexus 92300yc | ||
Cisco Nexus 92304qc | ||
Cisco Nexus 92348gc-x | ||
Cisco Nexus 9236c | ||
Cisco Nexus 9272q | ||
Cisco Nexus 93108tc-ex | ||
Cisco Nexus 93108tc-fx | ||
Cisco Nexus 93120tx | ||
Cisco Nexus 93128tx | ||
Cisco Nexus 93180lc-ex | ||
Cisco Nexus 93180yc-ex | ||
Cisco Nexus 93180yc-fx | ||
Cisco Nexus 93216tc-fx2 | ||
Cisco Nexus 93240yc-fx2 | ||
Cisco Nexus 9332c | ||
Cisco Nexus 9332pq | ||
Cisco Nexus 93360yc-fx2 | ||
Cisco Nexus 9336c-fx2 | ||
Cisco Nexus 9336pq Aci Spine | ||
Cisco Nexus 9348gc-fxp | ||
Cisco Nexus 9364c | ||
Cisco Nexus 9372px | ||
Cisco Nexus 9372px-e | ||
Cisco Nexus 9372tx | ||
Cisco Nexus 9372tx-e | ||
Cisco Nexus 9396px | ||
Cisco Nexus 9396tx | ||
Cisco Nexus 9504 | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-3398 refers to a vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software that could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS).
CVE-2020-3398 can cause a BGP session to repeatedly reset, resulting in a partial denial of service (DoS) condition due to the BGP session being down.
The severity of CVE-2020-3398 is rated as high with a CVSS score of 8.6.
Cisco NX-OS Software is affected by CVE-2020-3398.
No, Cisco Nexus 3016 is not vulnerable to CVE-2020-3398.