Packet Processing Vulnerability in Cisco Nexus Switching Products
CVE-2017-3804

6.1MEDIUM

Key Information:

Vendor
Cisco
Vendor
CVE Published:
26 January 2017

Summary

A vulnerability exists in the IS-IS protocol packet processing of Cisco Nexus 5000, 6000, and 7000 Series Switches. This issue can be exploited by an adjacent attacker to cause a reload of the affected switches. When processing a specially crafted link-state packet, the affected devices may crash due to an inst_001_isis_fabricpath hap reset, disrupting network operations within the FabricPath domain.

Affected Version(s)

Cisco Nexus 5000, 6000, 7000 Cisco Nexus 5000, 6000, 7000

References

CVSS V3.1

Score:
6.1
Severity:
MEDIUM
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Adjacent Network
Attack Complexity:
High
Privileges Required:
None
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.