A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the attacker to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network.
Advisories
Source ID Title
EUVD EUVD EUVD-2024-18036 A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the attacker to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-08-16T20:12:16.247Z

Reserved: 2023-11-08T15:08:07.640Z

Link: CVE-2024-20321

cve-icon Vulnrichment

Updated: 2024-08-01T21:59:41.467Z

cve-icon NVD

Status : Modified

Published: 2024-02-29T01:43:59.410

Modified: 2024-11-21T08:52:22.093

Link: CVE-2024-20321

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses