Cisco FXOS Software Link Layer Discovery Protocol DoS (cisco-sa-20181017-fxnx-os-dos)

medium Nessus Plugin ID 134946


The remote device is missing a vendor-supplied security patch


A denial of service (DoS) vulnerability exists in Cisco FX-OS Software due to improper input validation of certain type, length, value (TLV) fields of the LLDP frame header. An unauthenticated, local attacker can exploit this issue, by sending a crafted LLDP packet to an interface on the targeted device, to cause the system to reload.

Please see the included Cisco BIDs and Cisco Security Advisory for more information


Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvf23367

See Also

Plugin Details

Severity: Medium

ID: 134946

File Name: cisco-sa-20181017-fx-os-dos.nasl

Version: 1.4

Type: local

Family: CISCO

Published: 3/27/2020

Updated: 3/31/2020

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Low

Score: 3.6


Risk Factor: Low

Base Score: 2.9

Temporal Score: 2.1

Vector: AV:A/AC:M/Au:N/C:N/I:N/A:P

Temporal Vector: E:U/RL:OF/RC:C

CVSS Score Source: CVE-2018-0395


Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.6

Vector: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:fxos

Required KB Items: installed_sw/FXOS, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 10/17/2018

Vulnerability Publication Date: 10/17/2018

Reference Information

CVE: CVE-2018-0395


CISCO-SA: cisco-sa-20181017-fxnx-os-dos

CWE: 20