Skip Ribbon Commands
Skip to main content
Computer Security Incident Response Team of Mauritius (CERT-MU)

VN-2019-22


Cisco NX-OS Software Cisco Fabric Services over IP Denial of Service Vulnerability
Severity Rating: High
Systems Affected:
This vulnerability affects the following Cisco products if they are running a vulnerable release of Cisco NX-OS Software with CFSoIP enabled:
  • MDS 9000 Series Multilayer Switches
  • Nexus 3000 Series Switches
  • Nexus 3500 Platform Switches
  • Nexus 3600 Platform Switches
  • Nexus 5500 Platform Switches
  • Nexus 5600 Platform Switches
  • Nexus 6000 Series Switches
  • Nexus 7000 Series Switches
  • Nexus 7700 Series Switches
  • Nexus 9000 Series Switches in standalone NX-OS mode
  • Nexus 9500 R-Series Switching Platform
  • UCS 6200 Series Fabric Interconnects
  • UCS 6300 Series Fabric Interconnects
Description
A vulnerability has been identified in the Cisco Fabric Services component of Cisco NX-OS Software and this could be exploited by remote attackers to cause process crashes, which can result in a denial of service (DoS) condition on an affected system. The vulnerability is caused due to insufficient validation of TCP packets when processed by the Cisco Fabric Services over IP (CFSoIP) feature. Successful exploitation of this vulnerability could allow remote attackers to send a malicious Cisco Fabric Services TCP packet to an affected device. Successful exploitation of the vulnerability could allow the attacker to cause process crashes, resulting in a device reload and a DoS condition.
 
Solution
Users are advised to apply updates at the earliest.
More information is available on:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nxos-fsip-dos
 
Vendor Information
Cisco
CVE Information
 References
Cisco Security Advisory
Postal address
Mauritian Computer Emergency Response Team (CERT-MU)
National Computer Board
7th Floor, Stratton Court
La Poudriere Street
Port Louis