First published: Wed Aug 28 2019(Updated: )
A vulnerability in the IPv6 traffic processing of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an unexpected restart of the netstack process on an affected device. The vulnerability is due to improper validation of IPv6 traffic sent through an affected device. An attacker could exploit this vulnerability by sending a malformed IPv6 packet through an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition while the netstack process restarts. A sustained attack could lead to a reboot of the device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-ipv6-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS Software | >=8.1=8.2<=8.3<Maintenance Upgrade n7000-s2-dk9.8.3.2.CSCvn46719.bin | Maintenance Upgrade n7000-s2-dk9.8.3.2.CSCvn46719.bin |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco NX-OS Software vulnerability is cisco-sa-20190828-nxos-ipv6-dos.
The severity rating of the cisco-sa-20190828-nxos-ipv6-dos vulnerability is 8.6 (high).
An unauthenticated remote attacker can exploit the cisco-sa-20190828-nxos-ipv6-dos vulnerability by sending improper IPv6 traffic to the affected device, causing an unexpected restart of the netstack process.
The affected software versions of Cisco NX-OS Software for the cisco-sa-20190828-nxos-ipv6-dos vulnerability include versions 8.1, 8.2, and up to version 8.3 (excluding the Maintenance Upgrade n7000-s2-dk9.8.3.2.CSCvn46719.bin).
To fix the cisco-sa-20190828-nxos-ipv6-dos vulnerability, upgrade to the Maintenance Upgrade n7000-s2-dk9.8.3.2.CSCvn46719.bin or a higher version as recommended by Cisco.