CVE-2022-20623
Published Feb 23, 2022
Last updated a year ago
Overview
- Description
- A vulnerability in the rate limiter for Bidirectional Forwarding Detection (BFD) traffic of Cisco NX-OS Software for Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote attacker to cause BFD traffic to be dropped on an affected device. This vulnerability is due to a logic error in the BFD rate limiter functionality. An attacker could exploit this vulnerability by sending a crafted stream of traffic through the device. A successful exploit could allow the attacker to cause BFD traffic to be dropped, resulting in BFD session flaps. BFD session flaps can cause route instability and dropped traffic, resulting in a denial of service (DoS) condition. This vulnerability applies to both IPv4 and IPv6 traffic.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:N/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
- ykramarz@cisco.com
- CWE-399
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:n9k-c92160yc-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F8397775-5A75-4710-9044-B56E1CEE20A1" }, { "criteria": "cpe:2.3:h:cisco:n9k-c92300yc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE8EFEE8-FC8D-480C-917E-24C3B8D56E29" }, { "criteria": "cpe:2.3:h:cisco:n9k-c92304qc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "876304F4-4CE5-45B8-ADF5-2523319D05BB" }, { "criteria": "cpe:2.3:h:cisco:n9k-c9232c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2A9C0219-7EDC-40FD-A66B-24A92993F692" }, { "criteria": "cpe:2.3:h:cisco:n9k-c92348gc-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D23DFF0E-725B-4CCB-96A3-378600513CC5" }, { "criteria": "cpe:2.3:h:cisco:n9k-c9236c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "C71319A9-5B95-410A-BDDB-C47639B8E464" }, { "criteria": "cpe:2.3:h:cisco:n9k-c9272q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7B573EF4-2ABE-4ABE-A8D6-D8E14AD29E73" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93108tc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7482F9FB-CA6A-4CA2-B6FB-FD0DCDF603ED" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93108tc-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6487A95B-0D04-4ABA-B491-8A935694AFD3" }, { "criteria": "cpe:2.3:h:cisco:n9k-c9316d-gx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "122E24C3-1411-46DA-92F1-635BC0784559" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93180lc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F2E84307-41BC-4F85-BC9A-FF02178765F8" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93180yc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "55A31452-5B60-4273-BA38-8FA684DED953" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93180yc-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3C3FCA39-927B-4C89-A58B-E6859ED8176A" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93180yc2-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B7543DCD-5ED0-4400-9326-9714AB84E012" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93216tc-fx2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "37DA56C5-FDD0-4CC3-9DDF-8F1BBE94B003" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93240yc-fx2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D7B464B3-DE25-4980-ABC3-10D7C79C12E6" }, { "criteria": "cpe:2.3:h:cisco:n9k-c9332c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "365A5FB4-3DCE-48D7-8917-636E94389576" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93360yc-fx2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "961B0A51-15B4-45FF-BEAE-05667D76F418" }, { "criteria": "cpe:2.3:h:cisco:n9k-c9336c-fx2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A29C323C-6731-4CDA-B364-C1C8B8E60510" }, { "criteria": "cpe:2.3:h:cisco:n9k-c9348gc-fxp:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "214472EB-424C-48B7-8EF3-7B679A5042BF" }, { "criteria": "cpe:2.3:h:cisco:n9k-c93600cd-gx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A2D5229B-AFB2-4B28-95BB-563DBC346982" }, { "criteria": "cpe:2.3:h:cisco:n9k-c9364c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D32D88D4-EABA-4A3A-B300-374AA89525E3" }, { "criteria": "cpe:2.3:h:cisco:n9k-c9364c-gx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DD002B70-A630-4A5D-B63C-356AC7B8280C" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D790EFF-5EE6-4C8E-BEF6-6D25DCB48BF7", "versionEndIncluding": "7.0\\(3\\)i7\\(3\\)", "versionStartIncluding": "7.0\\(3\\)i6\\(2\\)" } ], "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:n9k-x97160yc-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "04A26215-DEB3-4337-AFE0-5E23C760060D" }, { "criteria": "cpe:2.3:h:cisco:n9k-x97284yc-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08F7DE85-9CD5-4A3D-859A-4B3479DACBF0" }, { "criteria": "cpe:2.3:h:cisco:n9k-x9732c-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6B8F7177-147E-47C0-ADFB-4CD0768D52CD" }, { "criteria": "cpe:2.3:h:cisco:n9k-x9732c-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "06A72F9F-773A-463D-8BEB-6B316DF21CFD" }, { "criteria": "cpe:2.3:h:cisco:n9k-x9736c-ex:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8FC94E7D-84AF-4D2A-85A7-264CED2D107B" }, { "criteria": "cpe:2.3:h:cisco:n9k-x9736c-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BC0082AD-1EFB-4AFE-9974-EAAB926553F3" }, { "criteria": "cpe:2.3:h:cisco:n9k-x9788tc-fx:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4BFAAE41-AD17-4F69-9029-8DD90D824E6F" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "23F2FF13-1288-49A5-9126-22BC0C39B77E", "versionEndIncluding": "9.3\\(8\\)", "versionStartIncluding": "7.0\\(3\\)i6\\(2\\)" }, { "criteria": "cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EA2371C0-3C84-4932-ABD0-6C59D292242F", "versionEndIncluding": "10.2\\(1\\)", "versionStartIncluding": "10.1\\(1\\)" } ], "operator": "OR" } ], "operator": "AND" } ]