First published: Wed Feb 28 2024(Updated: )
A vulnerability with the handling of MPLS traffic for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the netstack process to unexpectedly restart, which could cause the device to stop processing network traffic or to reload. This vulnerability is
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-ipv6-mpls-dos-R9ycXkwM vulnerability is rated high severity due to its potential impact on network availability.
To fix cisco-sa-ipv6-mpls-dos-R9ycXkwM, upgrade to the latest version of Cisco NX-OS Software as recommended in the security advisory.
The consequences of cisco-sa-ipv6-mpls-dos-R9ycXkwM include unexpected network outages and device reloads due to improper handling of MPLS traffic.
Organizations using vulnerable versions of Cisco NX-OS Software that handle IPv6 MPLS traffic are affected by cisco-sa-ipv6-mpls-dos-R9ycXkwM.
Yes, an unauthenticated remote attacker can exploit cisco-sa-ipv6-mpls-dos-R9ycXkwM to cause disruptions in network service.