Description
A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco NX-OS Software for the Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload.

This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the unexpected restart of the IS-IS process, which could cause the affected device to reload. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2 adjacent to the affected device.
Published: 2023-08-23
Score: 7.4 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-24348 A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco NX-OS Software for the Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload. This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the unexpected restart of the IS-IS process, which could cause the affected device to reload. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2 adjacent to the affected device.
History

No history.

Subscriptions

Cisco Nexus 3048 Nexus 31108pc-v Nexus 31108tc-v Nexus 31128pq Nexus 3132c-z Nexus 3132q-v Nexus 3132q-xl Nexus 3164q Nexus 3172pq Nexus 3172pq-xl Nexus 3172tq Nexus 3172tq-32t Nexus 3172tq-xl Nexus 3232 Nexus 3264c-e Nexus 3264q Nexus 3408-s Nexus 34180yc Nexus 34200yc-sm Nexus 3432d-s Nexus 3464c Nexus 3524 Nexus 3524-x Nexus 3524-xl Nexus 3548 Nexus 3548-x Nexus 3548-xl Nexus 36180yc-r Nexus 9232e Nexus 92348gc-x Nexus 9408 Nexus 9504 Nexus 9508 Nexus 9516 Nx-os
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-02T09:05:36.905Z

Reserved: 2022-10-27T18:47:50.362Z

Link: CVE-2023-20169

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2023-08-23T19:15:07.893

Modified: 2024-11-21T07:40:44.107

Link: CVE-2023-20169

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses