Description
A vulnerability in Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation when processing specific Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to the management interface of an affected device. A successful exploit could allow the attacker to cause the device to reload unexpectedly, resulting in a DoS condition. Note: Only the out-of-band (OOB) management interface is affected.
Problem types
Buffer Access with Incorrect Length Value
Product status
15.2(1g)
15.2(2e)
15.2(2f)
15.2(2g)
15.2(2h)
15.2(3f)
15.2(3e)
15.2(3g)
15.2(4d)
15.2(4e)
15.2(5c)
15.2(5d)
16.0(1g)
15.2(5e)
15.2(4f)
15.2(6e)
15.2(6h)
16.0(1j)
15.2(6g)
15.2(7f)
15.2(7g)
16.0(2h)
15.2(8d)
16.0(2j)
15.2(8e)
16.0(3d)
16.0(3e)
15.2(8f)
15.2(8g)
15.3(1d)
15.2(8h)
16.0(4c)
15.3(2a)
15.2(8i)
16.0(5h)
15.3(2b)
16.0(3g)
16.0(5j)
15.3(2c)
16.0(6c)
15.3(2d)
16.1(1f)
16.0(7e)
16.0(8e)
15.3(2e)
16.0(8f)
16.1(2f)
16.1(2g)
15.3(2f)
16.0(9c)
16.1(3f)
16.0(9d)
16.0(6h)
16.0(8h)
16.1(3g)
16.0(9e)
16.1(4h)
References
sec.cloudapps.cisco.com/...sory/cisco-sa-nxos-cpdos-qLsv6pFD (cisco-sa-nxos-cpdos-qLsv6pFD)