Description
A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation when an affected device is processing an MPLS echo-request or echo-reply packet. An attacker could exploit this vulnerability by sending malicious MPLS echo-request or echo-reply packets to an interface that is enabled for MPLS forwarding on the affected device. A successful exploit could allow the attacker to cause the MPLS OAM process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.
Published: 2021-08-25
Score: 8.6 High
EPSS: 1.4% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-7055 A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation when an affected device is processing an MPLS echo-request or echo-reply packet. An attacker could exploit this vulnerability by sending malicious MPLS echo-request or echo-reply packets to an interface that is enabled for MPLS forwarding on the affected device. A successful exploit could allow the attacker to cause the MPLS OAM process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.
History

Thu, 07 Nov 2024 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco Nexus 3000 Nexus 3048 Nexus 31108pc-v Nexus 31108tc-v Nexus 31128pq Nexus 3132c-z Nexus 3132q-v Nexus 3132q-x\/3132q-xl Nexus 3164q Nexus 3172pq\/pq-xl Nexus 3172tq-xl Nexus 3232c Nexus 3264c-e Nexus 3264q Nexus 3408-s Nexus 34180yc Nexus 3432d-s Nexus 3464c Nexus 3524-x\/xl Nexus 3548-x\/xl Nexus 36180yc-r Nexus 3636c-r Nexus 7000 10-slot Nexus 7000 18-slot Nexus 7000 4-slot Nexus 7000 9-slot Nexus 9000v Nexus 92160yc-x Nexus 92300yc Nexus 92304qc Nexus 92348gc-x Nexus 9236c Nexus 9272q Nexus 93108tc-ex Nexus 93108tc-ex-24 Nexus 93108tc-fx Nexus 93108tc-fx-24 Nexus 93108tc-fx3p Nexus 93120tx Nexus 93128tx Nexus 9316d-gx Nexus 93180lc-ex Nexus 93180yc-ex Nexus 93180yc-ex-24 Nexus 93180yc-fx Nexus 93180yc-fx-24 Nexus 93180yc-fx3 Nexus 93180yc-fx3s Nexus 93216tc-fx2 Nexus 93240yc-fx2 Nexus 9332c Nexus 9332pq Nexus 93360yc-fx2 Nexus 9336c-fx2 Nexus 9336c-fx2-e Nexus 9348gc-fxp Nexus 93600cd-gx Nexus 9364c Nexus 9364c-gx Nexus 9372px Nexus 9372px-e Nexus 9372tx Nexus 9372tx-e Nexus 9396px Nexus 9396tx Nexus 9508 Nx-os
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-07T22:02:19.462Z

Reserved: 2020-11-13T00:00:00.000Z

Link: CVE-2021-1588

cve-icon Vulnrichment

Updated: 2024-08-03T16:18:10.931Z

cve-icon NVD

Status : Modified

Published: 2021-08-25T20:15:11.537

Modified: 2024-11-21T05:44:41.290

Link: CVE-2021-1588

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses