CVE-2024-20267
Severity CVSS v4.0:
Pending analysis
Type:
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Publication date:
29/02/2024
Last modified:
04/03/2024
Description
A vulnerability with the handling of MPLS traffic for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the netstack process to unexpectedly restart, which could cause the device to stop processing network traffic or to reload. <br />
<br />
This vulnerability is due to lack of proper error checking when processing an ingress MPLS frame. An attacker could exploit this vulnerability by sending a crafted IPv6 packet that is encapsulated within an MPLS frame to an MPLS-enabled interface of the targeted device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition.<br />
<br />
Note: The IPv6 packet can be generated multiple hops away from the targeted device and then encapsulated within MPLS. The DoS condition may occur when the NX-OS device processes the packet.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:nx-os:6.0\(2\)a3\(1\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a3\(2\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a3\(4\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(1\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(2\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(3\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(4\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(5\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a4\(6\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(1\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(1a\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(2\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(2a\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(3\):*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:nx-os:6.0\(2\)a6\(3a\):*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page