CVE-2021-1588
Severity CVSS v4.0:
Pending analysis
Type:
CWE-125
Out-of-bounds Read
Publication date:
25/08/2021
Last modified:
07/11/2023
Description
A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation when an affected device is processing an MPLS echo-request or echo-reply packet. An attacker could exploit this vulnerability by sending malicious MPLS echo-request or echo-reply packets to an interface that is enabled for MPLS forwarding on the affected device. A successful exploit could allow the attacker to cause the MPLS OAM process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(9\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:8.4\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:9.3\(7\):*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3132q-x\/3132q-xl:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3172pq\/pq-xl:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



