Packet Processing Vulnerability in Cisco Nexus Switching Products
CVE-2017-3804
6.1MEDIUM
Summary
A vulnerability exists in the IS-IS protocol packet processing of Cisco Nexus 5000, 6000, and 7000 Series Switches. This issue can be exploited by an adjacent attacker to cause a reload of the affected switches. When processing a specially crafted link-state packet, the affected devices may crash due to an inst_001_isis_fabricpath hap reset, disrupting network operations within the FabricPath domain.
Affected Version(s)
Cisco Nexus 5000, 6000, 7000 Cisco Nexus 5000, 6000, 7000
References
CVSS V3.1
Score:
6.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed
Timeline
Vulnerability published
Vulnerability Reserved