Cisco NX-OS Software MPLS Encapsulated IPv6 DoS (cisco-sa-ipv6-mpls-dos-R9ycXkwM)

high Nessus Plugin ID 191469

Synopsis

The remote device is missing a vendor-supplied security patch

Description

A vulnerability with the handling of MPLS traffic for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the netstack process to unexpectedly restart, which could cause the device to stop processing network traffic or to reload. This vulnerability is due to lack of proper error checking when processing an ingress MPLS frame. An attacker could exploit this vulnerability by sending a crafted IPv6 packet that is encapsulated within an MPLS frame to an MPLS-enabled interface of the targeted device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition. Note: The IPv6 packet can be generated multiple hops away from the targeted device and then encapsulated within MPLS. The DoS condition may occur when the NX-OS device processes the packet.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Note that Nessus has not tested for these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCva52387, CSCwh42690

See Also

http://www.nessus.org/u?f3c8adc2

http://www.nessus.org/u?e327a04a

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCva52387

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwh42690

Plugin Details

Severity: High

ID: 191469

File Name: cisco-sa-ipv6-mpls-dos-R9ycXkwM.nasl

Version: 1.0

Type: combined

Family: CISCO

Published: 3/1/2024

Updated: 3/1/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2024-20267

CVSS v3

Risk Factor: High

Base Score: 8.6

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device

Exploit Ease: No known exploits are available

Patch Publication Date: 2/28/2024

Vulnerability Publication Date: 2/28/2024

Reference Information

CVE: CVE-2024-20267

CWE: 120

CISCO-SA: cisco-sa-ipv6-mpls-dos-R9ycXkwM

IAVA: 2024-A-0119

CISCO-BUG-ID: CSCva52387, CSCwh42690