5.3
CVSSv3

CVE-2020-10136

Published: 02/06/2020 Updated: 17/06/2024
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Vulnerability Summary

A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote malicious user to bypass certain security boundaries or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the affected device unexpectedly decapsulating and processing IP in IP packets that are destined to a locally configured IP address. An attacker could exploit this vulnerability by sending a crafted IP in IP packet to an affected device. A successful exploit could cause the affected device to unexpectedly decapsulate the IP in IP packet and forward the inner IP packet. This may result in IP packets bypassing input access control lists (ACLs) configured on the affected device or other security boundaries defined elsewhere in the network. Under certain conditions, an exploit could cause the network stack process to crash and restart multiple times, leading to a reload of the affected device and a DoS condition. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

cisco nx-os 5.2(1)sk3(1.1)

cisco nx-os 5.2(1)sk3(2.1)

cisco nx-os 5.2(1)sk3(2.1a)

cisco nx-os 5.2(1)sk3(2.2)

cisco nx-os 5.2(1)sk3(2.2b)

cisco nx-os 5.2(1)sm1(5.1)

cisco nx-os 5.2(1)sm1(5.2)

cisco nx-os 5.2(1)sm1(5.2a)

cisco nx-os 5.2(1)sm1(5.2b)

cisco nx-os 5.2(1)sm1(5.2c)

cisco nx-os 5.2(1)sm3(1.1)

cisco nx-os 5.2(1)sm3(1.1a)

cisco nx-os 5.2(1)sm3(1.1b)

cisco nx-os 5.2(1)sm3(1.1c)

cisco nx-os 5.2(1)sm3(2.1)

cisco nx-os 5.2(1)sv3(1.1)

cisco nx-os 5.2(1)sv3(1.2)

cisco nx-os 5.2(1)sv3(1.3)

cisco nx-os 5.2(1)sv3(1.4)

cisco nx-os 5.2(1)sv3(1.4b)

cisco nx-os 5.2(1)sv3(1.5a)

cisco nx-os 5.2(1)sv3(1.5b)

cisco nx-os 5.2(1)sv3(1.6)

cisco nx-os 5.2(1)sv3(1.10)

cisco nx-os 5.2(1)sv3(1.15)

cisco nx-os 5.2(1)sv3(2.1)

cisco nx-os 5.2(1)sv3(2.5)

cisco nx-os 5.2(1)sv3(2.8)

cisco nx-os 5.2(1)sv3(3.1)

cisco nx-os 5.2(1)sv3(3.15)

cisco nx-os 5.2(1)sv3(4.1)

cisco nx-os 5.2(1)sv3(4.1a)

cisco nx-os 5.2(1)sv3(4.1b)

cisco nx-os 5.2(1)sv5(1.1)

cisco nx-os 5.2(1)sv5(1.2)

cisco nx-os 5.2(1)sv5(1.3)

cisco nx-os 5.0(3)a1(1)

cisco nx-os 5.0(3)a1(2)

cisco nx-os 5.0(3)a1(2a)

cisco nx-os 5.0(3)u1(1)

cisco nx-os 5.0(3)u1(1a)

cisco nx-os 5.0(3)u1(1b)

cisco nx-os 5.0(3)u1(1c)

cisco nx-os 5.0(3)u1(1d)

cisco nx-os 5.0(3)u1(2)

cisco nx-os 5.0(3)u1(2a)

cisco nx-os 5.0(3)u2(1)

cisco nx-os 5.0(3)u2(2)

cisco nx-os 5.0(3)u2(2a)

cisco nx-os 5.0(3)u2(2b)

cisco nx-os 5.0(3)u2(2c)

cisco nx-os 5.0(3)u2(2d)

cisco nx-os 5.0(3)u3(1)

cisco nx-os 5.0(3)u3(2)

cisco nx-os 5.0(3)u3(2a)

cisco nx-os 5.0(3)u3(2b)

cisco nx-os 5.0(3)u4(1)

cisco nx-os 5.0(3)u5(1)

cisco nx-os 5.0(3)u5(1a)

cisco nx-os 5.0(3)u5(1b)

cisco nx-os 5.0(3)u5(1c)

cisco nx-os 5.0(3)u5(1d)

cisco nx-os 5.0(3)u5(1e)

cisco nx-os 5.0(3)u5(1f)

cisco nx-os 5.0(3)u5(1g)

cisco nx-os 5.0(3)u5(1h)

cisco nx-os 5.0(3)u5(1i)

cisco nx-os 5.0(3)u5(1j)

cisco nx-os 6.0(2)a1(1)

cisco nx-os 6.0(2)a1(1a)

cisco nx-os 6.0(2)a1(1b)

cisco nx-os 6.0(2)a1(1c)

cisco nx-os 6.0(2)a1(1d)

cisco nx-os 6.0(2)a1(1e)

cisco nx-os 6.0(2)a1(1f)

cisco nx-os 6.0(2)a1(2d)

cisco nx-os 6.0(2)a3(1)

cisco nx-os 6.0(2)a3(2)

cisco nx-os 6.0(2)a3(4)

cisco nx-os 6.0(2)a4(1)

cisco nx-os 6.0(2)a4(2)

cisco nx-os 6.0(2)a4(3)

cisco nx-os 6.0(2)a4(4)

cisco nx-os 6.0(2)a4(5)

cisco nx-os 6.0(2)a4(6)

cisco nx-os 6.0(2)u1(1)

cisco nx-os 6.0(2)u1(1a)

cisco nx-os 6.0(2)u1(2)

cisco nx-os 6.0(2)u1(3)

cisco nx-os 6.0(2)u1(4)

cisco nx-os 6.0(2)u2(1)

cisco nx-os 6.0(2)u2(2)

cisco nx-os 6.0(2)u2(3)

cisco nx-os 6.0(2)u2(4)

cisco nx-os 6.0(2)u2(4.92.4z)

cisco nx-os 6.0(2)u2(5)

cisco nx-os 6.0(2)u2(6)

cisco nx-os 6.0(2)u3(1)

cisco nx-os 6.0(2)u3(2)

cisco nx-os 6.0(2)u3(3)

cisco nx-os 6.0(2)u3(4)

cisco nx-os 6.0(2)u3(5)

cisco nx-os 6.0(2)u3(6)

cisco nx-os 6.0(2)u3(7)

cisco nx-os 6.0(2)u3(8)

cisco nx-os 6.0(2)u3(9)

cisco nx-os 6.0(2)u4(1)

cisco nx-os 6.0(2)u4(2)

cisco nx-os 6.0(2)u4(3)

cisco nx-os 6.0(2)u4(4)

cisco nx-os 6.0(2)u5(1)

cisco nx-os 6.1(2)i2(2b)

cisco nx-os 6.1(2)i3(1)

cisco nx-os 6.1(2)i3(2)

cisco nx-os 6.1(2)i3(3)

cisco nx-os 6.1(2)i3(3a)

cisco nx-os 7.0(3)i1(1)

cisco nx-os 7.0(3)i1(1a)

cisco nx-os 7.0(3)i1(1b)

cisco nx-os 7.0(3)i1(1z)

cisco nx-os 5.2(1)n1(1)

cisco nx-os 5.2(1)n1(1a)

cisco nx-os 5.2(1)n1(1b)

cisco nx-os 5.2(1)n1(2)

cisco nx-os 5.2(1)n1(2a)

cisco nx-os 5.2(1)n1(3)

cisco nx-os 5.2(1)n1(4)

cisco nx-os 5.2(1)n1(5)

cisco nx-os 5.2(1)n1(6)

cisco nx-os 5.2(1)n1(7)

cisco nx-os 5.2(1)n1(8)

cisco nx-os 5.2(1)n1(8a)

cisco nx-os 5.2(1)n1(8b)

cisco nx-os 5.2(1)n1(9)

cisco nx-os 5.2(1)n1(9a)

cisco nx-os 5.2(1)n1(9b)

cisco nx-os 6.0(2)n1(1)

cisco nx-os 6.0(2)n1(1a)

cisco nx-os 6.0(2)n1(2)

cisco nx-os 6.0(2)n1(2a)

cisco nx-os 6.0(2)n2(1)

cisco nx-os 6.0(2)n2(1b)

cisco nx-os 6.0(2)n2(2)

cisco nx-os 6.0(2)n2(3)

cisco nx-os 6.0(2)n2(4)

cisco nx-os 6.0(2)n2(5)

cisco nx-os 6.0(2)n2(5a)

cisco nx-os 6.0(2)n2(5b)

cisco nx-os 6.0(2)n2(6)

cisco nx-os 6.0(2)n2(7)

cisco nx-os 7.0(0)n1(1)

cisco nx-os 7.0(1)n1(1)

cisco nx-os 7.0(2)n1(1)

cisco nx-os 7.0(3)n1(1)

cisco nx-os 7.0(4)n1(1)

cisco nx-os 7.0(4)n1(1a)

cisco nx-os 7.0(5)n1(1)

cisco nx-os 7.0(5)n1(1a)

cisco nx-os 7.0(6)n1(1)

cisco nx-os 7.0(6)n1(2s)

cisco nx-os 7.0(6)n1(3s)

cisco nx-os 7.0(6)n1(4s)

cisco nx-os 7.0(7)n1(1)

cisco nx-os 7.0(7)n1(1a)

cisco nx-os 7.0(7)n1(1b)

cisco nx-os 7.0(8)n1(1)

cisco nx-os 7.0(8)n1(1a)

cisco nx-os 7.1(0)n1(1)

cisco nx-os 7.1(0)n1(1a)

cisco nx-os 7.1(0)n1(1b)

cisco nx-os 7.1(1)n1(1)

cisco nx-os 7.1(1)n1(1a)

cisco nx-os 7.1(2)n1(1)

cisco nx-os 7.1(2)n1(1a)

cisco nx-os 7.1(3)n1(1)

cisco nx-os 7.1(3)n1(2)

cisco nx-os 7.1(3)n1(2a)

cisco nx-os 7.1(3)n1(3)

cisco nx-os 7.1(3)n1(4)

cisco nx-os 7.1(3)n1(5)

cisco nx-os 7.1(4)n1(1)

cisco nx-os 7.1(4)n1(1a)

cisco nx-os 7.1(4)n1(1c)

cisco nx-os 7.1(4)n1(1d)

cisco nx-os 7.1(5)n1(1)

cisco nx-os 7.1(5)n1(1b)

cisco nx-os 7.2(1)n1(1)

cisco nx-os 7.3(0)n1(1)

cisco nx-os 7.3(0)n1(1a)

cisco nx-os 7.3(0)n1(1b)

cisco nx-os 7.3(1)n1(1)

cisco nx-os 7.3(2)n1(1)

cisco nx-os 7.3(2)n1(1b)

cisco nx-os 7.3(2)n1(1c)

cisco nx-os 7.3(3)n1(1)

cisco nx-os 7.3(4)n1(1)

cisco nx-os 7.3(4)n1(1a)

cisco nx-os 7.3(5)n1(1)

cisco nx-os 7.3(6)n1(1)

cisco nx-os 7.3(6)n1(1a)

cisco nx-os 7.3(7)n1(1)

cisco nx-os 7.3(7)n1(1a)

cisco nx-os 5.2(1)

cisco nx-os 5.2(3)

cisco nx-os 5.2(3a)

cisco nx-os 5.2(4)

cisco nx-os 5.2(5)

cisco nx-os 5.2(7)

cisco nx-os 5.2(9)

cisco nx-os 5.2(9a)

cisco nx-os 6.2(2)

cisco nx-os 6.2(2a)

cisco nx-os 6.2(6)

cisco nx-os 6.2(6a)

cisco nx-os 6.2(6b)

cisco nx-os 6.2(8)

cisco nx-os 6.2(8a)

cisco nx-os 6.2(8b)

cisco nx-os 6.2(10)

cisco nx-os 6.2(12)

cisco nx-os 6.2(14)

cisco nx-os 6.2(14a)

cisco nx-os 6.2(14b)

cisco nx-os 6.2(16)

cisco nx-os 6.2(18)

cisco nx-os 6.2(20)

cisco nx-os 6.2(20a)

cisco nx-os 6.2(22)

cisco nx-os 6.2(24)

cisco nx-os 7.2(0)d1(1)

cisco nx-os 7.2(1)d1(1)

cisco nx-os 7.2(2)d1(1)

cisco nx-os 7.2(2)d1(2)

cisco nx-os 7.2(2)d1(3)

cisco nx-os 7.2(2)d1(4)

cisco nx-os 7.3(0)d1(1)

cisco nx-os 7.3(0)dx(1)

cisco nx-os 7.3(1)d1(1)

cisco nx-os 7.3(2)d1(1)

cisco nx-os 7.3(2)d1(1d)

cisco nx-os 7.3(2)d1(2)

cisco nx-os 7.3(2)d1(3)

cisco nx-os 7.3(2)d1(3a)

cisco nx-os 7.3(3)d1(1)

cisco nx-os 7.3(4)d1(1)

cisco nx-os 7.3(5)d1(1)

cisco nx-os 7.3(6)d1(1)

cisco nx-os 6.1(2)i1(2)

cisco nx-os 6.1(2)i1(3)

cisco nx-os 6.1(2)i2(1)

cisco nx-os 6.1(2)i2(2)

cisco nx-os 6.1(2)i2(2a)

cisco nx-os 6.1(2)i2(3)

cisco ucs manager 3.2(3n)a

digi saros

hp x3220nr firmware

treck tcp/ip

cisco unified computing system -

Vendor Advisories

A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to bypass certain security boundaries or cause a denial of service (DoS) condition on an affected device The vulnerability is due to the affected device unexpectedly decapsulating and processing IP in IP packets that are destined to a local ...

Recent Articles

Tycoon malware rages through US schools, LG's boot problem, and QNAP admins had better get busy
The Register • Shaun Nichols in San Francisco • 08 Jun 2020

Also: Cisco and Apple push out patches

It is time once again for El Reg's weekly security roundup. Here's a look at a few of the more interesting stories making the rounds over the past seven days. A few weeks back, hackers dumped limited information on some 40 million people who used Wishbone, a sort of polling app where users choose between two different items. Now, the lawyers have stepped in and filed a class action suit against Mammoth Media, the company that made the leaky app. Of particular interest is the fact that many of th...