First published: Wed Feb 28 2024(Updated: )
A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.This vulnerability exists because eBGP traffic is mapped to a shared
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-nxos-ebgp-dos-L3QCwVJ is classified as critical, allowing for potential denial of service.
To fix cisco-sa-nxos-ebgp-dos-L3QCwVJ, update the Cisco NX-OS Software to the latest patched version as recommended by Cisco security advisories.
Cisco NX-OS users utilizing the External Border Gateway Protocol (eBGP) feature are affected by cisco-sa-nxos-ebgp-dos-L3QCwVJ.
cisco-sa-nxos-ebgp-dos-L3QCwVJ involves a denial of service (DoS) attack that targets the eBGP implementation in Cisco NX-OS Software.
No, cisco-sa-nxos-ebgp-dos-L3QCwVJ can be exploited by unauthenticated remote attackers.