A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote malicious user to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the malicious user to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco nx-os 9.2(2) |
||
cisco nx-os 9.2(1) |
||
cisco nx-os 7.0(3)f3(3) |
||
cisco nx-os 9.3(1) |
||
cisco nx-os 9.2(3) |
||
cisco nx-os 7.0(3)f3(1) |
||
cisco nx-os 7.0(3)f3(2) |
||
cisco nx-os 7.0(3)f3(4) |
||
cisco nx-os 7.0(3)f3(3a) |
||
cisco nx-os 7.0(3)f3(3c) |
||
cisco nx-os 7.0(3)f3(5) |
||
cisco nx-os 9.3(5) |
||
cisco nx-os 9.3(6) |
||
cisco nx-os 9.3(7) |
||
cisco nx-os 9.3(4) |
||
cisco nx-os 9.3(3) |
||
cisco nx-os 7.0(3)f2(1) |
||
cisco nx-os 7.0(3)f1(1) |
||
cisco nx-os 7.0(3)f2(2) |
||
cisco nx-os 9.3(2) |
||
cisco nx-os 9.2(2t) |
||
cisco nx-os 9.2(2v) |
||
cisco nx-os 9.2(4) |
||
cisco nx-os 9.3(7a) |
||
cisco nx-os 9.3(8) |
||
cisco nx-os 9.3(9) |
||
cisco nx-os 9.3(10) |
||
cisco nx-os 9.3(11) |
||
cisco nx-os 10.1(1) |
||
cisco nx-os 10.1(2) |
||
cisco nx-os 10.1(2t) |
||
cisco nx-os 10.2(1) |
||
cisco nx-os 10.2(1q) |
||
cisco nx-os 10.2(2) |
||
cisco nx-os 10.2(3) |
||
cisco nx-os 10.2(3t) |
||
cisco nx-os 10.2(4) |
||
cisco nx-os 10.2(5) |
||
cisco nx-os 10.3(1) |
||
cisco nx-os 10.3(2) |
||
cisco nx-os 9.3(12) |
||
cisco nx-os 10.2(3v) |
||
cisco nx-os 10.2(6) |
||
cisco nx-os 10.3(3) |
||
cisco nx-os 10.3(99w) |
||
cisco nx-os 10.3(99x) |
||
cisco nx-os 10.4(1) |
||
cisco nx-os 10.3(4a) |