First published: Wed Aug 28 2019(Updated: )
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of Abstract Syntax Notation One (ASN.1)-encoded variables in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the SNMP daemon on the affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-fxnxos-snmp-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco FX-OS | =2.4<2.4.1.222=2.3<2.3.1.130=2.2<2.2.2.91=Earlier than 2.2<2.2.2.91 | 2.4.1.222 2.3.1.130 2.2.2.91 2.2.2.91 |
Cisco NX-OS | =6.2<6.2(29)=5.2<6.2(29) | 6.2(29) 6.2(29) |
Cisco NX-OS | ||
Cisco NX-OS | =5.2<5.2(1)SV3(4.1a)=Earlier than 5.2<5.2(1)SV3(4.1a) | 5.2(1)SV3(4.1a) 5.2(1)SV3(4.1a) |
Cisco NX-OS | =7.1<7.1(5)N1(1b)=Earlier than 7.1<7.1(5)N1(1b) | 7.1(5)N1(1b) 7.1(5)N1(1b) |
Cisco NX-OS | =14.1<14.1(1i)=14.0<14.0(2c)=13.2<13.2(7k)=13.1<13.2(7k)>=.1<13<13.2(7k) | 14.1(1i) 14.0(2c) 13.2(7k) 13.2(7k) 13.2(7k) |
Cisco NX-OS | =4.0<4.0(4e)=3.2<3.2(3l)=Earlier than 3.2<3.2(3l) | 4.0(4e) 3.2(3l) 3.2(3l) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco vulnerability is cisco-sa-20190828-fxnxos-snmp-dos.
The severity of the vulnerability cisco-sa-20190828-fxnxos-snmp-dos is high, with a severity value of 7.7.
The Cisco FXOS Software versions 2.4.1.222, 2.3.1.130, and 2.2.2.91 are affected by the vulnerability. The Cisco NX-OS Software versions 6.2(29) and 5.2(1)SV3(4.1a) are also affected by the vulnerability.
An authenticated, remote attacker can exploit the vulnerability cisco-sa-20190828-fxnxos-snmp-dos by sending malicious SNMP packets to the affected device, causing the SNMP application to restart unexpectedly.
You can find more information about the vulnerability cisco-sa-20190828-fxnxos-snmp-dos on the Cisco Security Advisory page: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-fxnxos-snmp-dos