A vulnerability in the Precision Time Protocol (PTP) feature of Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of protection against PTP frame flood attacks. An attacker could exploit this vulnerability by sending large streams of malicious IPv4 or IPv6 PTP traffic to the affected device. A successful exploit could allow the attacker to cause a DoS condition, impacting the traffic passing through the device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181017-nexus-ptp-dos | Vendor Advisory |
http://www.securitytracker.com/id/1041920 | Third Party Advisory VDB Entry |
http://www.securityfocus.com/bid/105669 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2018-10-17 14:49
Updated : 2019-10-09 16:31
NVD link : CVE-2018-0378
Mitre link : CVE-2018-0378
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
cisco
- nexus_5596t
- nexus_5596up
- nexus_5624q
- nexus_5648q
- nexus_6001
- nexus_5672up
- nexus_6004
- nexus_5548p
- nexus_5548up
- nexus_56128p
- nx-os
- nexus_5696q
- nexus_5672up-16g