6.3
CVSSv2

CVE-2013-5496

Published: 16/09/2013 Updated: 16/10/2013
CVSS v2 Base Score: 6.3 | Impact Score: 6.9 | Exploitability Score: 6.8
VMScore: 561
Vector: AV:N/AC:M/Au:S/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the Open Network Environment Platform (ONEP) could allow an authenticated, remote malicious user to cause the network element to reload. The vulnerability is due to insufficient pointer validation. An attacker could exploit this vulnerability by sending a crafted packet to an ONEP enabled network element. An exploit could allow the malicious user to cause the network element to reload. Cisco has confirmed the vulnerability in a security notice and released software updates. To exploit this vulnerability, the attacker would need to authenticate and send crafted packets to the targeted system, which may reside on trusted, internal networks. These access requirements reduce the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco nx-os -

Vendor Advisories

A vulnerability in the Open Network Environment Platform (ONEP) could allow an authenticated, remote attacker to cause the network element to reload The vulnerability is due to insufficient pointer validation An attacker could exploit this vulnerability by sending a crafted packet to an ONEP enabled network element An exploit could allow the at ...