CVE-2024-20267

Severity CVSS v4.0:
Pending analysis
Type:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
29/02/2024
Last modified:
04/03/2024

Description

A vulnerability with the handling of MPLS traffic for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the netstack process to unexpectedly restart, which could cause the device to stop processing network traffic or to reload. <br /> <br /> This vulnerability is due to lack of proper error checking when processing an ingress MPLS frame. An attacker could exploit this vulnerability by sending a crafted IPv6 packet that is encapsulated within an MPLS frame to an MPLS-enabled interface of the targeted device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition.<br /> <br /> Note: The IPv6 packet can be generated multiple hops away from the targeted device and then encapsulated within MPLS. The DoS condition may occur when the NX-OS device processes the packet.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:cisco:nx-os:6.0\(2\)a3\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a3\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a3\(4\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(4\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(5\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(6\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(1a\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(2\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(2a\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(3a\):*:*:*:*:*:*:*