BDU:2024-01802

Vulnerability from fstec - Published: 28.02.2024
VLAI Severity ?
Title
Уязвимость реализации протокола LLDP (Link Layer Discovery Protocol) операционных систем Cisco NX-OS и Cisco FXOS, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость реализации протокола LLDP (Link Layer Discovery Protocol) операционных систем Cisco NX-OS и Cisco FXOS связана с неконтролируемым расходом ресурсов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, вызвать отказ в обслуживании
Vendor
Cisco Systems Inc.
Software Name
NX-OS, FX-OS
Software Version
7.0(3)i6 (NX-OS), 7.0(3)i7 (NX-OS), 6.2 (NX-OS), 7.0(3)F3 (NX-OS), 9.2 (NX-OS), 7.0(3)IA7 (NX-OS), 9.3 (NX-OS), 7.0(3)IM7 (NX-OS), 7.2(0)D1 (NX-OS), 7.2(1)D1 (NX-OS), 7.2(2)D1 (NX-OS), 7.3(0)DX (NX-OS), 7.3(0)DY (NX-OS), 7.3(0)N1 (NX-OS), 7.3(1)D1 (NX-OS), 7.3(1)DY (NX-OS), 7.3(1)N1 (NX-OS), 7.3(2)D1 (NX-OS), 7.3(2)N1 (NX-OS), 7.3(4)N1 (NX-OS), 7.3(3)D1 (NX-OS), 7.0(3)IC4 (NX-OS), 7.0(3)IM3 (NX-OS), 7.3(4)D1 (NX-OS), 7.3(5)N1 (NX-OS), 7.3(6)N1 (NX-OS), 7.3(5)D1 (NX-OS), 7.3(7)N1 (NX-OS), 8.4 (NX-OS), 10.1 (NX-OS), 7.3(6)D1 (NX-OS), 7.3(8)N1 (NX-OS), 7.3(7)D1 (NX-OS), 7.3(9)N1 (NX-OS), 7.3(10)N1 (NX-OS), 7.3(8)D1 (NX-OS), 10.2 (NX-OS), 7.3(11)N1 (NX-OS), 6.0(2)A3 (NX-OS), 6.0(2)A4 (NX-OS), 6.0(2)A6 (NX-OS), 6.0(2)A7 (NX-OS), 6.0(2)A8 (NX-OS), 6.0(2)U2 (NX-OS), 6.0(2)U3 (NX-OS), 6.0(2)U4 (NX-OS), 6.0(2)U5 (NX-OS), 6.0(2)U6 (NX-OS), 7.0(3)F1 (NX-OS), 7.0(3)F2 (NX-OS), 7.0(3)I2 (NX-OS), 7.0(3)I3 (NX-OS), 7.0(3)I4 (NX-OS), 7.0(3)I5 (NX-OS), 7.1(0)N1 (NX-OS), 7.1(1)N1 (NX-OS), 7.1(2)N1 (NX-OS), 7.1(3)N1 (NX-OS), 7.1(4)N1 (NX-OS), 7.1(5)N1 (NX-OS), 7.3(0)D1 (NX-OS), 7.3(3)N1 (NX-OS), 8.5 (NX-OS), 2.2 (FX-OS), 2.3 (FX-OS), 2.6 (FX-OS), 2.8 (FX-OS), 2.9 (FX-OS), 2.10 (FX-OS), 2.11 (FX-OS), 2.12 (FX-OS), 8.0 (NX-OS), 8.1 (NX-OS), 8.2 (NX-OS), 8.3 (NX-OS), 7.3(12)N1 (NX-OS), 10.3 (NX-OS), 7.3(13)N1 (NX-OS), 2.13 (FX-OS), 2.14 (FX-OS), 12.0 (NX-OS), 12.1 (NX-OS), 12.2 (NX-OS), 12.3 (NX-OS), 13.0 (NX-OS), 13.1 (NX-OS), 13.2 (NX-OS), 14.0 (NX-OS), 14.1 (NX-OS), 14.2 (NX-OS), 15.0 (NX-OS), 15.1 (NX-OS), 15.2 (NX-OS), 16.0 (NX-OS), 15.3 (NX-OS)
Possible Mitigations
Использование рекомендаций производителя: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt
Reference
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt https://vuldb.com/pl/?id.255134
CWE
CWE-400

{
  "CVSS 2.0": "AV:A/AC:L/Au:N/C:N/I:N/A:C",
  "CVSS 3.0": "AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
  "CVSS 4.0": null,
  "remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
  "remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
  "\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
  "\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "7.0(3)i6 (NX-OS), 7.0(3)i7 (NX-OS), 6.2 (NX-OS), 7.0(3)F3 (NX-OS), 9.2 (NX-OS), 7.0(3)IA7 (NX-OS), 9.3 (NX-OS), 7.0(3)IM7 (NX-OS), 7.2(0)D1 (NX-OS), 7.2(1)D1 (NX-OS), 7.2(2)D1 (NX-OS), 7.3(0)DX (NX-OS), 7.3(0)DY (NX-OS), 7.3(0)N1 (NX-OS), 7.3(1)D1 (NX-OS), 7.3(1)DY (NX-OS), 7.3(1)N1 (NX-OS), 7.3(2)D1 (NX-OS), 7.3(2)N1 (NX-OS), 7.3(4)N1 (NX-OS), 7.3(3)D1 (NX-OS), 7.0(3)IC4 (NX-OS), 7.0(3)IM3 (NX-OS), 7.3(4)D1 (NX-OS), 7.3(5)N1 (NX-OS), 7.3(6)N1 (NX-OS), 7.3(5)D1 (NX-OS), 7.3(7)N1 (NX-OS), 8.4 (NX-OS), 10.1 (NX-OS), 7.3(6)D1 (NX-OS), 7.3(8)N1 (NX-OS), 7.3(7)D1 (NX-OS), 7.3(9)N1 (NX-OS), 7.3(10)N1 (NX-OS), 7.3(8)D1 (NX-OS), 10.2 (NX-OS), 7.3(11)N1 (NX-OS), 6.0(2)A3 (NX-OS), 6.0(2)A4 (NX-OS), 6.0(2)A6 (NX-OS), 6.0(2)A7 (NX-OS), 6.0(2)A8 (NX-OS), 6.0(2)U2 (NX-OS), 6.0(2)U3 (NX-OS), 6.0(2)U4 (NX-OS), 6.0(2)U5 (NX-OS), 6.0(2)U6 (NX-OS), 7.0(3)F1 (NX-OS), 7.0(3)F2 (NX-OS), 7.0(3)I2 (NX-OS), 7.0(3)I3 (NX-OS), 7.0(3)I4 (NX-OS), 7.0(3)I5 (NX-OS), 7.1(0)N1 (NX-OS), 7.1(1)N1 (NX-OS), 7.1(2)N1 (NX-OS), 7.1(3)N1 (NX-OS), 7.1(4)N1 (NX-OS), 7.1(5)N1 (NX-OS), 7.3(0)D1 (NX-OS), 7.3(3)N1 (NX-OS), 8.5 (NX-OS), 2.2 (FX-OS), 2.3 (FX-OS), 2.6 (FX-OS), 2.8 (FX-OS), 2.9 (FX-OS), 2.10 (FX-OS), 2.11 (FX-OS), 2.12 (FX-OS), 8.0 (NX-OS), 8.1 (NX-OS), 8.2 (NX-OS), 8.3 (NX-OS), 7.3(12)N1 (NX-OS), 10.3 (NX-OS), 7.3(13)N1 (NX-OS), 2.13 (FX-OS), 2.14 (FX-OS), 12.0 (NX-OS), 12.1 (NX-OS), 12.2 (NX-OS), 12.3 (NX-OS), 13.0 (NX-OS), 13.1 (NX-OS), 13.2 (NX-OS), 14.0 (NX-OS), 14.1 (NX-OS), 14.2 (NX-OS), 15.0 (NX-OS), 15.1 (NX-OS), 15.2 (NX-OS), 16.0 (NX-OS), 15.3 (NX-OS)",
  "\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt",
  "\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "28.02.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "06.03.2024",
  "\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "06.03.2024",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2024-01802",
  "\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2024-20294",
  "\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
  "\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
  "\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "NX-OS, FX-OS",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Cisco Systems Inc. - - Firepower 9300 Security Appliance, Cisco Systems Inc. - - Cisco MDS 9000 Series Multilayer Switches, Cisco Systems Inc. - - Cisco Nexus 3000 Series Switches, Cisco Systems Inc. - - Cisco Nexus 7000 Series Switches, Cisco Systems Inc. - - Cisco Nexus 5500 Platform Switches, Cisco Systems Inc. - - Cisco Nexus 5600 Platform Switches, Cisco Systems Inc. - - Cisco Nexus 6000 Series Switches, Cisco Systems Inc. - - Cisco Firepower 4100 Series, Cisco Systems Inc. - - Cisco Nexus 9000 Series Switches in standalone NX-OS mode, Cisco Systems Inc. - - Cisco Nexus 9000 Series Fabric Switches in ACI mode, Cisco Systems Inc. - - UCS 6200 Series Fabric Interconnects, Cisco Systems Inc. - - UCS 6300 Series Fabric Interconnects, Cisco Systems Inc. - - UCS 6400 Series Fabric Interconnects, Cisco Systems Inc. - - UCS 6500 Series Fabric Interconnects",
  "\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 LLDP (Link Layer Discovery Protocol) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco NX-OS \u0438 Cisco FXOS, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u0439 \u0440\u0430\u0441\u0445\u043e\u0434 \u0440\u0435\u0441\u0443\u0440\u0441\u0430 (\u00ab\u0418\u0441\u0442\u043e\u0449\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u0430\u00bb) (CWE-400)",
  "\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 LLDP (Link Layer Discovery Protocol) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco NX-OS \u0438 Cisco FXOS \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u043a\u043e\u043d\u0442\u0440\u043e\u043b\u0438\u0440\u0443\u0435\u043c\u044b\u043c \u0440\u0430\u0441\u0445\u043e\u0434\u043e\u043c \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0435\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
  "\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
  "\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
  "\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
  "\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
  "\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
  "\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-lldp-dos-z7PncTgt\nhttps://vuldb.com/pl/?id.255134",
  "\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
  "\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
  "\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-400",
  "\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,1)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,5)"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…