Cisco Nexus, Cisco Unified Computing System (UCS), Cisco MDS 9000 Series Multilayer Switches, and Cisco 1000 Series Connected Grid Routers (CGR) are all based on the Cisco NX-OS operating system. These products are affected by one or more of the following vulnerabilities: Multiple Cisco Discovery Protocol Vulnerabilities in Cisco NX-OS-Based Products Cisco NX-OS Software SNMP and License Manager Buffer Overflow Vulnerability Cisco NX-OS Software SNMP Buffer Overflow Vulnerability Cisco NX-OS Software Jumbo Packet Denial of Service Vulnerability Cisco has released software updates that address these vulnerabilities. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130424-nxosmulti
|
Cisco Nexus 7000 | Cisco Nexus 5000 |
Cisco Nexus 5500 | Cisco Nexus 4000 | Cisco Nexus 3000 | Cisco Nexus 1000V | Cisco MDS 9000 | Cisco UCS 6100 |
Cisco UCS 6200 |
Cisco CGR 1000 |
Multiple CDP Buffer Overflow CVE-2013-1178 |
X |
X |
X | X | X | X | X | X | X | X |
SNMP & License Manager Buffer Overflow CVE-2013-1179 |
X | |
|
|
|
X | |
|
||
SNMP Buffer Overflow CVE-2013-1180 |
X | |
|
|
|
X | |
|
||
Jumbo Frame Denial of Service CVE-2013-1181 |
X | |
X |
|
|
|
X | |
||
Recommended Software |
5.2(9)/6.1(1) |
5.2(1)N1(4) |
5.2(1)N1(4) | 4.1(2)E1(1j) | 5.0(3)U5(1e) | 4.2(1)SV2(1.1) | 5.2(8) |
2.1.1e |
2.1.1e |
CG4(1) |
|
Affected | First Fixed | Recommended |
Multiple CDP CVE-2013-1178 |
4.1(x) 4.2(x) 5.0(x) 5.1(x) 5.2(3a) and Prior 6.0(x) |
5.2(4) 6.1(1) |
5.2(9) 6.1(1) |
SNMP & License Manager CVE-2013-1179 |
4.1(x) 4.2(x) 5.0(x) 5.1(x) 5.2(4) and Prior 6.0(x) |
5.2(5) 6.1(1) |
5.2(9) 6.1(1) |
SNMP CVE-2013-1180 |
4.1(x) 4.2(x) 5.0(x) 5.1(x) 5.2(4) and Prior 6.0(x) |
5.2(5) 6.1(1) |
5.2(9) 6.1(1) |
|
Affected | First Fixed | Recommended |
Multiple CDP CVE-2013-1178 |
4.0(x) 4.1(x) 4.2(x) 5.0(x) |
5.1(3)N1(1) |
5.2(1)N1(4) |
Jumbo Frame - Nexus 5500 CVE-2013-1181 |
4.0(x) 4.1(x) 4.2(x) 5.0(3)N2(1) and Prior |
5.0(3)N2(2) |
5.2(1)N1(4) |
|
Affected | First Fixed | Recommended |
Multiple CDP CVE-2013-1178 |
4.1(2)E1(1g) and Prior |
4.1(2)E1(1h) |
4.1(2)E1(1j) |
|
Affected | First Fixed | Recommended |
Multiple CDP CVE-2013-1178 |
5.0(3)U1(1x) 5.0(3)U1(2x) 5.0(3)U2(1) 5.0(3)U2(2x) |
5.0(3)U3(1) |
5.0(3)U5(1e) |
Jumbo Frame CVE-2013-1181 |
5.0(3)U1(1x) 5.0(3)U1(2x) 5.0(3)U2(1) 5.0(3)U2(2x) 5.0(3)U3(1) |
5.0(3)U3(2) |
5.0(3)U5(1e) |
|
Affected | First Fixed | Recommended |
Multiple CDP CVE-2013-1178 |
4.0(x) 4.2(1)SV1(4b) and Prior |
4.2(1)SV1(5.1) |
4.2(1)SV2(1.1) |
|
Affected | First Fixed | Recommended |
Multiple CDP CVE-2013-1178 |
4.1(x) 4.2(x) 5.0(x) 5.2(3) and Prior |
5.2(4) |
5.2(8) |
SNMP & License Manager CVE-2013-1179 |
4.1(x) 4.2(x) 5.0(x) 5.2(4) and Prior |
5.2(5) |
5.2(8) |
SNMP CVE-2013-1180 |
4.1(x) 4.2(x) 5.0(x) 5.2(4) and Prior |
5.2(5) |
5.2(8) |
|
Affected | First Fixed | Recommended |
Multiple CDP CVE-2013-1178 |
1.0(x) 1.1(x) 1.2(x) 1.3(x) 1.4(x) 2.0(1x) and Prior |
2.0(2m) 2.1(1a) |
2.1.1e |
Jumbo Frame - UCS 6200 CVE-2013-1181 |
1.0(x) 1.1(x) 1.2(x) 1.3(x) 1.4(x) 2.0(1t) and prior |
2.0(1w) |
2.1.1e |
|
Affected | First Fixed | Recommended |
Multiple CDP CVE-2013-1178 |
CG1(4) CG1(5) CG3(1) CG3(2) CG3(3) |
CG4(1) |
CG4(1) |
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
Revision 1.2 | 2013-April-26 | Updated summary table in Affected Products for clarification. Corrected UCS 6100/6200 information for jumbo frame vulnerability in summary table. |
Revision 1.1 | 2013-April-24 | Clarified affected platforms for certain vulnerabilities. |
Revision 1.0 | 2013-April-24 | Initial public release. |
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A stand-alone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy, and may lack important information or contain factual errors. The information in this document is intended for end-users of Cisco products.