A vulnerability in the Border Gateway Protocol (BGP) Multicast VPN (MVPN) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a BGP session to repeatedly reset, causing a partial denial of service (DoS) condition due to the BGP session being down. The vulnerability is due to incorrect parsing of a specific type of BGP MVPN update message. An attacker could exploit this vulnerability by sending this BGP MVPN update message to a targeted device. A successful exploit could allow the attacker to cause the BGP peer connections to reset, which could lead to BGP route instability and impact traffic. The incoming BGP MVPN update message is valid but is parsed incorrectly by the NX-OS device, which could send a corrupted BGP update to the configured BGP peer. Note: The Cisco implementation of BGP accepts incoming BGP traffic from only explicitly configured peers. To exploit this vulnerability, an attacker must send a specific BGP MVPN update message over an established TCP connection that appears to come from a trusted BGP peer. To do so, the attacker must obtain information about the BGP peers in the trusted network of the affected system.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:30
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxosbgp-mvpn-dos-K8kbCrJp - Vendor Advisory |
Information
Published : 2020-08-27 16:15
Updated : 2024-11-21 05:30
NVD link : CVE-2020-3398
Mitre link : CVE-2020-3398
CVE.ORG link : CVE-2020-3398
JSON object : View
Products Affected
cisco
- nexus_9348gc-fxp
- nexus_3524-x
- nexus_3064-t
- nexus_3172pq-xl
- nexus_3548-xl
- nexus_31128pq
- nexus_93360yc-fx2
- nexus_3048
- nexus_93180yc-fx
- nexus_31108tc-v
- nexus_3164q
- nexus_9396tx
- nexus_3636c-r
- nexus_7000
- nexus_9332c
- nexus_9516
- nexus_9000v
- nexus_3524
- nexus_92160yc-x
- nexus_3132q-xl
- nexus_3548
- nexus_93216tc-fx2
- nexus_9364c
- nx-os
- nexus_3264c-e
- nexus_3172
- nexus_93108tc-fx
- nexus_93180lc-ex
- nexus_93240yc-fx2
- nexus_3464c
- nexus_3408-s
- nexus_3064
- nexus_9372px-e
- nexus_7700
- nexus_31108pc-v
- nexus_92300yc
- nexus_93180yc-ex
- nexus_3432d-s
- nexus_3132q
- nexus_9372px
- nexus_9372tx-e
- nexus_3132c-z
- nexus_9508
- nexus_3524-xl
- nexus_3172tq-32t
- nexus_3172tq
- nexus_9396px
- nexus_3172tq-xl
- nexus_93128tx
- nexus_93120tx
- nexus_93108tc-ex
- nexus_9372tx
- nexus_92348gc-x
- nexus_3548-x
- nexus_34180yc
- nexus_92304qc
- nexus_36180yc-r
- nexus_9504
- nexus_3016
- nexus_3264q
- nexus_9236c
- nexus_9332pq
- nexus_9336pq_aci_spine
- nexus_3132q-v
- nexus_9272q
- nexus_3232c
- nexus_9336c-fx2
CWE
CWE-20
Improper Input Validation