Show plain JSON{"dataType": "CVE_RECORD", "dataVersion": "5.1", "cveMetadata": {"cveId": "CVE-2024-20321", "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "state": "PUBLISHED", "assignerShortName": "cisco", "dateReserved": "2023-11-08T15:08:07.640Z", "datePublished": "2024-02-28T16:14:28.992Z", "dateUpdated": "2024-08-16T20:12:16.247Z"}, "containers": {"cna": {"providerMetadata": {"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco", "dateUpdated": "2024-02-28T16:14:28.992Z"}, "descriptions": [{"lang": "en", "value": "A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.\r\n\r This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the attacker to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network."}], "affected": [{"vendor": "Cisco", "product": "Cisco NX-OS Software", "versions": [{"version": "7.0(3)F1(1)", "status": "affected"}, {"version": "7.0(3)F2(1)", "status": "affected"}, {"version": "7.0(3)F2(2)", "status": "affected"}, {"version": "7.0(3)F3(1)", "status": "affected"}, {"version": "7.0(3)F3(2)", "status": "affected"}, {"version": "7.0(3)F3(3)", "status": "affected"}, {"version": "7.0(3)F3(3a)", "status": "affected"}, {"version": "7.0(3)F3(4)", "status": "affected"}, {"version": "7.0(3)F3(3c)", "status": "affected"}, {"version": "7.0(3)F3(5)", "status": "affected"}, {"version": "9.2(1)", "status": "affected"}, {"version": "9.2(2)", "status": "affected"}, {"version": "9.2(2t)", "status": "affected"}, {"version": "9.2(3)", "status": "affected"}, {"version": "9.2(4)", "status": "affected"}, {"version": "9.2(2v)", "status": "affected"}, {"version": "9.3(1)", "status": "affected"}, {"version": "9.3(2)", "status": "affected"}, {"version": "9.3(3)", "status": "affected"}, {"version": "9.3(4)", "status": "affected"}, {"version": "9.3(5)", "status": "affected"}, {"version": "9.3(6)", "status": "affected"}, {"version": "9.3(7)", "status": "affected"}, {"version": "9.3(7a)", "status": "affected"}, {"version": "9.3(8)", "status": "affected"}, {"version": "9.3(9)", "status": "affected"}, {"version": "9.3(10)", "status": "affected"}, {"version": "9.3(11)", "status": "affected"}, {"version": "9.3(12)", "status": "affected"}, {"version": "10.1(1)", "status": "affected"}, {"version": "10.1(2)", "status": "affected"}, {"version": "10.1(2t)", "status": "affected"}, {"version": "10.2(1)", "status": "affected"}, {"version": "10.2(1q)", "status": "affected"}, {"version": "10.2(2)", "status": "affected"}, {"version": "10.2(3)", "status": "affected"}, {"version": "10.2(3t)", "status": "affected"}, {"version": "10.2(4)", "status": "affected"}, {"version": "10.2(5)", "status": "affected"}, {"version": "10.2(3v)", "status": "affected"}, {"version": "10.2(6)", "status": "affected"}, {"version": "10.3(1)", "status": "affected"}, {"version": "10.3(2)", "status": "affected"}, {"version": "10.3(3)", "status": "affected"}, {"version": "10.3(99w)", "status": "affected"}, {"version": "10.3(99x)", "status": "affected"}, {"version": "10.3(4a)", "status": "affected"}, {"version": "10.4(1)", "status": "affected"}]}], "problemTypes": [{"descriptions": [{"lang": "en", "description": "Uncontrolled Resource Consumption", "type": "cwe", "cweId": "CWE-400"}]}], "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ebgp-dos-L3QCwVJ", "name": "cisco-sa-nxos-ebgp-dos-L3QCwVJ"}], "metrics": [{"format": "cvssV3_1", "cvssV3_1": {"version": "3.1", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "baseScore": 8.6, "baseSeverity": "HIGH", "attackVector": "NETWORK", "attackComplexity": "LOW", "privilegesRequired": "NONE", "userInteraction": "NONE", "scope": "CHANGED", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "HIGH"}}], "exploits": [{"lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}], "source": {"advisory": "cisco-sa-nxos-ebgp-dos-L3QCwVJ", "discovery": "INTERNAL", "defects": ["CSCwh09703", "CSCwh96478"]}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-01T21:59:41.467Z"}, "title": "CVE Program Container", "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ebgp-dos-L3QCwVJ", "name": "cisco-sa-nxos-ebgp-dos-L3QCwVJ", "tags": ["x_transferred"]}]}, {"affected": [{"vendor": "cisco", "product": "nx-os", "cpes": ["cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(3c\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:7.0\\(3\\)f3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.2\\(2v\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(7\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(7a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(8\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(9\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(10\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(11\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:9.3\\(12\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.1\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.1\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.1\\(2t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(1q\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3t\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(4\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(5\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(3v\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.2\\(6\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(1\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(2\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(3\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(99w\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(99x\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.3\\(4a\\):*:*:*:*:*:*:*", "cpe:2.3:o:cisco:nx-os:10.4\\(1\\):*:*:*:*:*:*:*"], "defaultStatus": "unknown", "versions": [{"version": "7.0\\(3\\)f1\\(1\\)", "status": "affected"}, {"version": "7.0\\(3\\)f2\\(1\\)", "status": "affected"}, {"version": "7.0\\(3\\)f2\\(2\\)", "status": "affected"}, {"version": "7.0\\(3\\)f3\\(1\\)", "status": "affected"}, {"version": "7.0\\(3\\)f3\\(2\\)", "status": "affected"}, {"version": "7.0\\(3\\)f3\\(3\\)", "status": "affected"}, {"version": "7.0\\(3\\)f3\\(3a\\)", "status": "affected"}, {"version": "7.0\\(3\\)f3\\(4\\)", "status": "affected"}, {"version": "7.0\\(3\\)f3\\(3c\\)", "status": "affected"}, {"version": "7.0\\(3\\)f3\\(5\\)", "status": "affected"}, {"version": "9.2\\(1\\)", "status": "affected"}, {"version": "9.2\\(2\\)", "status": "affected"}, {"version": "9.2\\(2t\\)", "status": "affected"}, {"version": "9.2\\(3\\)", "status": "affected"}, {"version": "9.2\\(4\\)", "status": "affected"}, {"version": "9.2\\(2v\\)", "status": "affected"}, {"version": "9.3\\(1\\)", "status": "affected"}, {"version": "9.3\\(2\\)", "status": "affected"}, {"version": "9.3\\(3\\)", "status": "affected"}, {"version": "9.3\\(4\\)", "status": "affected"}, {"version": "9.3\\(5\\)", "status": "affected"}, {"version": "9.3\\(6\\)", "status": "affected"}, {"version": "9.3\\(7\\)", "status": "affected"}, {"version": "9.3\\(7a\\)", "status": "affected"}, {"version": "9.3\\(8\\)", "status": "affected"}, {"version": "9.3\\(9\\)", "status": "affected"}, {"version": "9.3\\(10\\)", "status": "affected"}, {"version": "9.3\\(11\\)", "status": "affected"}, {"version": "9.3\\(12\\)", "status": "affected"}, {"version": "10.1\\(1\\)", "status": "affected"}, {"version": "10.1\\(2\\)", "status": "affected"}, {"version": "10.1\\(2t\\)", "status": "affected"}, {"version": "10.2\\(1\\)", "status": "affected"}, {"version": "10.2\\(1q\\)", "status": "affected"}, {"version": "10.2\\(2\\)", "status": "affected"}, {"version": "10.2\\(3\\)", "status": "affected"}, {"version": "10.2\\(3t\\)", "status": "affected"}, {"version": "10.2\\(4\\)", "status": "affected"}, {"version": "10.2\\(5\\)", "status": "affected"}, {"version": "10.2\\(3v\\)", "status": "affected"}, {"version": "10.2\\(6\\)", "status": "affected"}, {"version": "10.3\\(1\\)", "status": "affected"}, {"version": "10.3\\(2\\)", "status": "affected"}, {"version": "10.3\\(3\\)", "status": "affected"}, {"version": "10.3\\(99w\\)", "status": "affected"}, {"version": "10.3\\(99x\\)", "status": "affected"}, {"version": "10.3\\(4a\\)", "status": "affected"}, {"version": "10.4\\(1\\)", "status": "affected"}]}], "metrics": [{"other": {"type": "ssvc", "content": {"timestamp": "2024-03-01T16:27:01.615257Z", "id": "CVE-2024-20321", "options": [{"Exploitation": "none"}, {"Automatable": "yes"}, {"Technical Impact": "partial"}], "role": "CISA Coordinator", "version": "2.0.3"}}}], "title": "CISA ADP Vulnrichment", "providerMetadata": {"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP", "dateUpdated": "2024-08-16T20:12:16.247Z"}}]}}