First published: Thu Feb 16 2023(Updated: )
A vulnerability in the DNS functionality of Cisco Nexus Dashboard Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. This vulnerability is due to the improper processing of DNS requests. An attacker could exploit this vulnerability by sending a continuous stream of DNS requests to an affected device. A successful exploit could allow the attacker to cause the coredns service to stop working or cause the device to reload, resulting in a DoS condition.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Dashboard | <2.3\(1c\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco Nexus Dashboard Software vulnerability is CVE-2023-20014.
The severity of CVE-2023-20014 is high with a CVSS score of 7.5.
CVE-2023-20014 affects Cisco Nexus Dashboard Software through the vulnerability in the DNS functionality, which could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
An attacker can exploit CVE-2023-20014 by sending a specially crafted DNS request.
Yes, a fix for CVE-2023-20014 is available. Please refer to the Cisco Security Advisory for more information.