Cisco NX-OS Improper Input Validation (CVE-2013-6982)

medium Tenable OT Security Plugin ID 502767

Synopsis

The remote OT asset is affected by a vulnerability.

Description

The BGP implementation in Cisco NX-OS 6.2(2a) and earlier does not properly handle the interaction of UPDATE messages with IPv6, VPNv4, and VPNv6 labeled unicast-address families, which allows remote attackers to cause a denial of service (peer reset) via a crafted message, aka Bug ID CSCuj03174.

This plugin only works with Tenable.ot.
Please visit https://www.tenable.com/products/tenable-ot for more information.

Solution

Refer to the vendor advisory.

See Also

http://osvdb.org/101713

http://secunia.com/advisories/56169

http://www.nessus.org/u?ccf8bb40

http://tools.cisco.com/security/center/viewAlert.x?alertId=32325

http://www.securityfocus.com/bid/64670

http://www.securitytracker.com/id/1029568

https://exchange.xforce.ibmcloud.com/vulnerabilities/90119

Plugin Details

Severity: Medium

ID: 502767

File Name: tenable_ot_cisco_CVE-2013-6982.nasl

Version: 1.3

Type: remote

Family: Tenable.ot

Published: 12/4/2024

Updated: 3/23/2026

Supported Sensors: Tenable OT Security

Risk Information

VPR

Risk Factor: Low

Score: 3.4

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2013-6982

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Tenable.ot/Cisco

Exploit Ease: No known exploits are available

Patch Publication Date: 1/8/2014

Vulnerability Publication Date: 1/8/2014

Reference Information

CVE: CVE-2013-6982

CWE: 20