First published: Wed Aug 25 2021(Updated: )
A vulnerability in the VXLAN Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software, known as NGOAM, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific packets with a Transparent Interconnection of Lots of Links (TRILL) OAM EtherType. An attacker could exploit this vulnerability by sending crafted packets, including the TRILL OAM EtherType of 0x8902, to a device that is part of a VXLAN Ethernet VPN (EVPN) fabric. A successful exploit could allow the attacker to cause an affected device to experience high CPU usage and consume excessive system resources, which may result in overall control plane instability and cause the affected device to reload. Note: The NGOAM feature is disabled by default.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | ||
Cisco Nexus 3000 | ||
Cisco Nexus 3048 Firmware | ||
Cisco Nexus 31108PV-V | ||
Cisco Nexus 31108TC-V Firmware | ||
Cisco Nexus 31128PQ | ||
Cisco Nexus 3132C-Z Firmware | ||
Cisco Nexus 3132Q-V Firmware | ||
Cisco Nexus 3132Q-X/3132Q-XL | ||
Cisco Nexus 3164Q Firmware | ||
Cisco Nexus 3172PQ/PQ-XL | ||
Cisco Nexus 3172TQ-XL Firmware | ||
Cisco Nexus 3232C | ||
Cisco Nexus 3264C-E Firmware | ||
Cisco Nexus 3264Q Firmware | ||
Cisco Nexus 3408-S Firmware | ||
Cisco Nexus 34180YC Firmware | ||
Cisco Nexus 3432D-S Firmware | ||
Cisco Nexus 3464C Firmware | ||
Cisco Nexus 3524-x/xl | ||
Cisco Nexus 3548-x/xl | ||
Cisco Nexus 36180YC-R Firmware | ||
Cisco Nexus 3636C-R Firmware | ||
Cisco NX-OS Nexus 9000 Series | ||
Cisco Nexus 92160YC Switch | ||
Cisco Nexus 92300YC Switch | ||
Cisco Nexus 92304qc | ||
Cisco Nexus 92348GC-X Switch | ||
Cisco Nexus 9236c | ||
Cisco Nexus 9272Q Switch | ||
Cisco Nexus Series | ||
Cisco Nexus 93108TC-EX-24 Switch | ||
Cisco Nexus 93108TC-FX Switch | ||
Cisco Nexus 93108TC-FX Switch | ||
Cisco Nexus 93108TC-FX3P Firmware | ||
Cisco Nexus 93120tx | ||
Cisco Nexus 93128tx | ||
Cisco Nexus 9316D-GX Firmware | ||
Cisco Nexus 93180LC-EX Switch | ||
Cisco Nexus 93180YC-EX | ||
Cisco Nexus 93180YC-EX-24 Firmware | ||
Cisco Nexus 93180YC-FX Firmware | ||
Cisco Nexus 93180YC-FX-24 Firmware | ||
Cisco Nexus 93180YC-FX3 Firmware | ||
Cisco Nexus 93180YC-FX3S Firmware | ||
Cisco Nexus 93216TC-FX2 Firmware | ||
Cisco Nexus 93240YC-FX2 Firmware | ||
Cisco Nexus 9332C Firmware | ||
Cisco Nexus 9332pq | ||
Cisco Nexus 93360YC-FX2 | ||
Cisco Nexus 9336C-FX2 Firmware | ||
Cisco Nexus 9336C-FX2-E Firmware | ||
Cisco Nexus 9348GC-FXP Firmware | ||
Cisco Nexus 93600CD-GX Firmware | ||
Cisco Nexus 9364C-GX Firmware | ||
Cisco Nexus 9364C-GX Firmware | ||
Cisco Nexus 9372px | ||
Cisco Nexus 9372PX-E Switch | ||
Cisco Nexus 9372tx | ||
Cisco Nexus 9372TX-E Switch | ||
Cisco Nexus 9396px | ||
Cisco Nexus 9396tx | ||
Cisco Nexus 9508 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1587 is a vulnerability in the VXLAN Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software that could allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on an affected device.
CVE-2021-1587 has a severity rating of 8.6, which is considered high.
Cisco Nexus devices running Cisco NX-OS Software are affected by CVE-2021-1587.
An attacker can exploit CVE-2021-1587 by sending specially crafted packets to a vulnerable device.
Yes, Cisco has released software updates to address the vulnerability. It is recommended to apply the necessary updates as soon as possible.