- Description
- A vulnerability in Intermediate System-to-Intermediate System (IS-IS) protocol packet processing of Cisco Nexus 5000, 6000, and 7000 Series Switches software could allow an unauthenticated, adjacent attacker to cause a reload of the affected device. Switches in the FabricPath domain crash because of an __inst_001__isis_fabricpath hap reset when processing a crafted link-state packet. More Information: CSCvc45002. Known Affected Releases: 7.1(3)N1(2.1) 7.1(3)N1(3.12) 7.3(2)N1(0.296) 8.0(1)S2. Known Fixed Releases: 6.2(18)S11 7.0(3)I5(1.170) 7.0(3)I5(2) 7.1(4)N1(0.4) 7.1(4)N1(1b) 7.1(5)N1(0.986) 7.1(5)N1(1) 7.2(3)D1(0.8) 7.3(2)N1(0.304) 7.3(2)N1(1) 8.0(0.96)S0 8.0(1) 8.0(1)E1 8.0(1)S4 8.3(0)CV(0.788).
- Source
- ykramarz@cisco.com
- NVD status
- Modified
CVSS 3.0
- Type
- Primary
- Base score
- 6.1
- Impact score
- 4
- Exploitability score
- 1.6
- Vector string
- CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5.7
- Impact score
- 6.9
- Exploitability score
- 5.5
- Vector string
- AV:A/AC:M/Au:N/C:N/I:N/A:C
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(2.1\\):*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C97083C8-89AE-4D0D-A039-1B798D60B573"
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.1\\(3\\)n1\\(3.12\\):*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "768151A3-CCF6-4F37-877F-4F1F2CD60791"
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(2\\)n1\\(0.296\\):*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8BB84933-1B94-474A-ABB6-AFF91B62446A"
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:8.0\\(1\\)s2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "167FD2BD-A610-4966-86DF-DA5C78E0D3D2"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4F2B1E07-8519-4F58-9048-81ABA12E01DC"
},
{
"criteria": "cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB"
},
{
"criteria": "cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "4F557E38-09F6-42C6-BABA-3C3168B38BBA"
},
{
"criteria": "cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]