4.3
CVSSv2

CVE-2013-6982

Published: 08/01/2014 Updated: 29/08/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P

Vulnerability Summary

The BGP implementation in Cisco NX-OS 6.2(2a) and previous versions does not properly handle the interaction of UPDATE messages with IPv6, VPNv4, and VPNv6 labeled unicast-address families, which allows remote malicious users to cause a denial of service (peer reset) via a crafted message, aka Bug ID CSCuj03174.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco nx-os 4.0\\(0\\)n1\\(2a\\)

cisco nx-os 4.0\\(1a\\)n1\\(1\\)

cisco nx-os 4.0\\(4\\)sv1\\(3a\\)

cisco nx-os 4.0\\(4\\)sv1\\(3b\\)

cisco nx-os 4.1.\\(3\\)

cisco nx-os 4.1.\\(4\\)

cisco nx-os 4.2\\(1\\)sv1\\(4\\)

cisco nx-os 4.2\\(1\\)sv1\\(4a\\)

cisco nx-os 4.2.\\(2a\\)

cisco nx-os 5.0

cisco nx-os 5.0\\(2\\)

cisco nx-os 5.0\\(3\\)n1\\(1a\\)

cisco nx-os 5.0\\(3\\)n1\\(1b\\)

cisco nx-os 5.0\\(3\\)u1\\(1b\\)

cisco nx-os 5.0\\(3\\)u1\\(1d\\)

cisco nx-os 5.0\\(3\\)u2\\(2d\\)

cisco nx-os 5.0\\(3\\)u3\\(1\\)

cisco nx-os 5.0\\(3\\)u5\\(1b\\)

cisco nx-os 5.0\\(3\\)u5\\(1c\\)

cisco nx-os 5.1\\(2\\)

cisco nx-os 5.1\\(3\\)

cisco nx-os 5.2\\(3\\)

cisco nx-os 5.2\\(3a\\)

cisco nx-os 6.1

cisco nx-os -

cisco nx-os 4.0

cisco nx-os 4.0\\(1a\\)n2\\(1a\\)

cisco nx-os 4.0\\(4\\)sv1\\(1\\)

cisco nx-os 4.1\\(3\\)n1\\(1a\\)

cisco nx-os 4.1\\(3\\)n2\\(1\\)

cisco nx-os 4.2\\(1\\)

cisco nx-os 4.2\\(1\\)n1\\(1\\)

cisco nx-os 4.2\\(3\\)

cisco nx-os 4.2\\(4\\)

cisco nx-os 5.0\\(2\\)n2\\(1a\\)

cisco nx-os 5.0\\(2a\\)

cisco nx-os 5.0\\(3\\)n2\\(2\\)

cisco nx-os 5.0\\(3\\)n2\\(2a\\)

cisco nx-os 5.0\\(3\\)u2\\(1\\)

cisco nx-os 5.0\\(3\\)u2\\(2\\)

cisco nx-os 5.0\\(3\\)u3\\(2b\\)

cisco nx-os 5.0\\(3\\)u4\\(1\\)

cisco nx-os 5.0\\(5\\)

cisco nx-os 5.1

cisco nx-os 5.1\\(4\\)

cisco nx-os 5.1\\(5\\)

cisco nx-os 5.2\\(7\\)

cisco nx-os 5.2\\(9\\)

cisco nx-os

cisco nx-os 6.1\\(1\\)

cisco nx-os 4.0\\(0\\)n1\\(1a\\)

cisco nx-os 4.0\\(0\\)n1\\(2\\)

cisco nx-os 4.0\\(4\\)sv1\\(2\\)

cisco nx-os 4.0\\(4\\)sv1\\(3\\)

cisco nx-os 4.1\\(3\\)n2\\(1a\\)

cisco nx-os 4.1.\\(2\\)

cisco nx-os 4.2\\(1\\)n2\\(1\\)

cisco nx-os 4.2\\(1\\)n2\\(1a\\)

cisco nx-os 4.2\\(6\\)

cisco nx-os 4.2\\(8\\)

cisco nx-os 5.0\\(3\\)

cisco nx-os 5.0\\(3\\)n1\\(1\\)

cisco nx-os 5.0\\(3\\)n2\\(2b\\)

cisco nx-os 5.0\\(3\\)u1\\(1a\\)

cisco nx-os 5.0\\(3\\)u2\\(2a\\)

cisco nx-os 5.0\\(3\\)u2\\(2b\\)

cisco nx-os 5.0\\(3\\)u2\\(2c\\)

cisco nx-os 5.0\\(3\\)u5\\(1\\)

cisco nx-os 5.0\\(3\\)u5\\(1a\\)

cisco nx-os 5.1\\(1\\)

cisco nx-os 5.1\\(1a\\)

cisco nx-os 5.1\\(6\\)

cisco nx-os 5.2

cisco nx-os 5.2\\(1\\)

cisco nx-os 6.0\\(1\\)

cisco nx-os 6.0\\(2\\)

cisco nx-os 4.0\\(1a\\)n1\\(1a\\)

cisco nx-os 4.0\\(1a\\)n2\\(1\\)

cisco nx-os 4.0\\(4\\)sv1\\(3c\\)

cisco nx-os 4.0\\(4\\)sv1\\(3d\\)

cisco nx-os 4.1\\(3\\)n1\\(1\\)

cisco nx-os 4.1.\\(5\\)

cisco nx-os 4.2

cisco nx-os 4.2\\(1\\)sv1\\(5.1\\)

cisco nx-os 4.2\\(2\\)

cisco nx-os 5.0\\(2\\)n1\\(1\\)

cisco nx-os 5.0\\(2\\)n2\\(1\\)

cisco nx-os 5.0\\(3\\)n1\\(1c\\)

cisco nx-os 5.0\\(3\\)n2\\(1\\)

cisco nx-os 5.0\\(3\\)u1\\(2\\)

cisco nx-os 5.0\\(3\\)u1\\(2a\\)

cisco nx-os 5.0\\(3\\)u3\\(2\\)

cisco nx-os 5.0\\(3\\)u3\\(2a\\)

cisco nx-os 5.0\\(3\\)u5\\(1d\\)

cisco nx-os 5.0\\(3\\)u5\\(1e\\)

cisco nx-os 5.1\\(3\\)n1\\(1\\)

cisco nx-os 5.1\\(3\\)n1\\(1a\\)

cisco nx-os 5.2\\(4\\)

cisco nx-os 5.2\\(5\\)

cisco nx-os 6.1\\(2\\)

cisco nx-os 6.1\\(3\\)

Vendor Advisories

A vulnerability in the Border Gateway Protocol (BGP) functionality of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause all BGP sessions on the device to reset The vulnerability is due to the improper processing of specifically crafted BGP update messages An attacker could exploit this vulnerability by crafting a spec ...