CVE-2021-1588
25.08.2021, 20:15
A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation when an affected device is processing an MPLS echo-request or echo-reply packet. An attacker could exploit this vulnerability by sending malicious MPLS echo-request or echo-reply packets to an interface that is enabled for MPLS forwarding on the affected device. A successful exploit could allow the attacker to cause the MPLS OAM process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.Enginsight
Vendor | Product | Version |
---|---|---|
cisco | nx-os | 7.0\(3\)i7\(9\) |
cisco | nx-os | 8.4\(1\) |
cisco | nx-os | 9.3\(7\) |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-126 - Buffer Over-readThe software reads from a buffer using buffer access mechanisms such as indexes or pointers that reference memory locations after the targeted buffer.
- CWE-20 - Improper Input ValidationThe product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.