Cisco NX-OS Software Border Gateway Protocol DoS (cisco-sa-20180620-nxosbgp)

high Nessus Plugin ID 138351

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco NX-OS Software is affected by a distributed denial of service (DDoS) vulnerability in the Border Gateway Protocol due to incompleteinput validation of the BGP update messages. An unauthenticated, remote attacker can exploit this to cause a denial of service (DoS) condition due to the device unexpectedly reloading.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCve79599, CSCve87784, CSCve91371, CSCve91387

See Also

http://www.nessus.org/u?eacb926e

http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-67770

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve79599

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve87784

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve91371

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCve91387

Plugin Details

Severity: High

ID: 138351

File Name: cisco-sa-20180620-nxosbgp.nasl

Version: 1.4

Type: combined

Family: CISCO

Published: 7/9/2020

Updated: 7/10/2020

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2018-0295

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device

Exploit Ease: No known exploits are available

Patch Publication Date: 6/20/2018

Vulnerability Publication Date: 6/20/2018

Reference Information

CVE: CVE-2018-0295