First published: Wed Jun 03 2020(Updated: )
A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because crafted SXP packets are mishandled. An attacker could exploit this vulnerability by sending specifically crafted SXP packets to the affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR
Credit: FSTEC (https://fstec.ru/en).
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS and IOS XE Software | ||
Cisco NX-OS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-sxp-68TEVzR is considered high due to its potential to cause a denial of service condition.
To fix cisco-sa-sxp-68TEVzR, upgrade to the latest version of the affected Cisco IOS, IOS XE, or NX-OS software released by Cisco.
Devices running Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software are affected by cisco-sa-sxp-68TEVzR.
Yes, cisco-sa-sxp-68TEVzR can be exploited by unauthenticated, remote attackers.
The impact of cisco-sa-sxp-68TEVzR is the potential for the affected device to reload, leading to a denial of service.