Cisco Nexus 9000 Series Fabric Switches in ACI Mode Link Layer Discovery Protocol Memory Leak Denial of Service (CVE-2023-20089)

medium Tenable OT Security Plugin ID 501386

Synopsis

The remote OT asset is affected by a vulnerability.

Description

A vulnerability in the Link Layer Discovery Protocol (LLDP) feature for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated, adjacent attacker to cause a memory leak, which could result in an unexpected reload of the device. This vulnerability is due to incorrect error checking when parsing ingress LLDP packets. An attacker could exploit this vulnerability by sending a steady stream of crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause a memory leak, which could result in a denial of service (DoS) condition when the device unexpectedly reloads. Note: This vulnerability cannot be exploited by transit traffic through the device. The crafted LLDP packet must be targeted to a directly connected interface, and the attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). In addition, the attack surface for this vulnerability can be reduced by disabling LLDP on interfaces where it is not required.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://www.nessus.org/u?65ab8fb4

Plugin Details

Severity: Medium

ID: 501386

Version: 1.1

Type: remote

Family: Tenable.ot

Published: 7/25/2023

Updated: 7/26/2023

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 6.1

Temporal Score: 4.5

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2023-20089

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 5.7

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os:15.2%284d%29, cpe:/o:cisco:nx-os:16.0%281g%29, cpe:/o:cisco:nx-os:15.2%281g%29, cpe:/o:cisco:nx-os:15.2%283f%29, cpe:/o:cisco:nx-os:15.2%283g%29, cpe:/o:cisco:nx-os:15.2%284f%29, cpe:/o:cisco:nx-os:15.2%285c%29, cpe:/o:cisco:nx-os:15.2%285d%29, cpe:/o:cisco:nx-os:15.2%282e%29, cpe:/o:cisco:nx-os:15.2%282h%29, cpe:/o:cisco:nx-os:15.2%284e%29, cpe:/o:cisco:nx-os:16.0%281j%29, cpe:/o:cisco:nx-os:15.2%282g%29, cpe:/o:cisco:nx-os:15.2%285e%29, cpe:/o:cisco:nx-os:15.2%282f%29, cpe:/o:cisco:nx-os:15.2%283e%29

Required KB Items: Tenable.ot/Cisco

Exploit Ease: No known exploits are available

Patch Publication Date: 2/23/2023

Vulnerability Publication Date: 2/23/2023

Reference Information

CVE: CVE-2023-20089

CWE: 401