A vulnerability in the Network Time Protocol (NTP) feature of Cisco NX-OS Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to excessive use of system resources when the affected device is logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. An attacker could exploit this vulnerability by flooding the device with a steady stream of Mode 7 NTP packets. A successful exploit could allow the malicious user to cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload. Note: The NTP feature is enabled by default.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco nx-os 8.3 |
||
cisco nx-os 6.2 |
||
cisco nx-os 7.3 |
||
cisco nx-os 8.1 |
||
cisco nx-os 8.2 |
||
cisco nx-os 6.0\\(2\\)u6 |
||
cisco nx-os 7.0\\(3\\)i |
||
cisco nx-os 9.2 |
||
cisco nx-os 9.2\\(1\\) |
||
cisco nx-os 6.0\\(2\\)a8\\(9.7\\) |
||
cisco nx-os 6.0\\(2\\)a8 |
||
cisco nx-os 7.0\\(3\\)i7 |
||
cisco nx-os 7.0\\(3\\)f |
||
cisco nx-os 7.1\\(4\\)n1\\(1\\) |
||
cisco nx-os 7.1\\(4\\) |
||
cisco nx-os 7.1\\(5\\) |
||
cisco nx-os 7.2 |
||
cisco nx-os 8.0 |
||
cisco nx-os 7.3\\(2\\)d1\\(1\\) |
||
cisco nx-os 8.3\\(2\\)s5 |