A vulnerability in the IPv6 traffic processing of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an unexpected restart of the netstack process on an affected device. The vulnerability is due to improper validation of IPv6 traffic sent through an affected device. An attacker could exploit this vulnerability by sending a malformed IPv6 packet through an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition while the netstack process restarts. A sustained attack could lead to a reboot of the device.

Project Subscriptions

Vendors Products
7000 10-slot Subscribe
7000 18-slot Subscribe
7000 4-slot Subscribe
7000 9-slot Subscribe
7700 10-slot Subscribe
7700 18-slot Subscribe
7700 2-slot Subscribe
7700 6-slot Subscribe
N77-f312ck-26 Subscribe
N77-f324fq-25 Subscribe
N77-f348xp-23 Subscribe
N77-f430cq-36 Subscribe
N77-m312cq-26l Subscribe
N77-m324fq-25l Subscribe
N77-m348xp-23l Subscribe
N7k-f248xp-25e Subscribe
N7k-f306ck-25 Subscribe
N7k-f312fq-25 Subscribe
N7k-m202cf-22l Subscribe
N7k-m206fq-23l Subscribe
N7k-m224xp-23l Subscribe
N7k-m324fq-25l Subscribe
N7k-m348xp-25l Subscribe
Nexus 7000 Supervisor 1 Subscribe
Nexus 7000 Supervisor 2 Subscribe
Nexus 7000 Supervisor 2e Subscribe
Nexus 7700 Supervisor 2e Subscribe
Nexus 7700 Supervisor 3e Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-10521 A vulnerability in the IPv6 traffic processing of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an unexpected restart of the netstack process on an affected device. The vulnerability is due to improper validation of IPv6 traffic sent through an affected device. An attacker could exploit this vulnerability by sending a malformed IPv6 packet through an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition while the netstack process restarts. A sustained attack could lead to a reboot of the device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-19T18:58:18.814Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1964

cve-icon Vulnrichment

Updated: 2024-08-04T18:35:51.707Z

cve-icon NVD

Status : Modified

Published: 2019-08-28T19:15:10.973

Modified: 2024-11-21T04:37:46.927

Link: CVE-2019-1964

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses