A vulnerability within the Endpoint Learning feature of Cisco Nexus 9000 Series Switches running in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an endpoint device in certain circumstances. The vulnerability is due to improper endpoint learning when packets are received on a specific port from outside the ACI fabric and destined to an endpoint located on a border leaf when Disable Remote Endpoint Learning has been enabled. This can result in a Remote (XR) entry being created for the impacted endpoint that will become stale if the endpoint migrates to a different port or leaf switch. This results in traffic not reaching the impacted endpoint until the Remote entry can be relearned by another mechanism.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190828-nexus-aci-dos | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2019-08-30 02:15
Updated : 2019-10-09 16:48
NVD link : CVE-2019-1977
Mitre link : CVE-2019-1977
JSON object : View
CWE
CWE-371
State Issues
Products Affected
cisco
- nexus_9372tx-e
- nexus_9372px
- nexus_93108tc-ex
- nexus_9336c-fx2
- nexus_93108tc-fx
- nexus_9000
- nexus_93120tx
- nexus_9372px-e
- nexus_93180lc-ex
- nexus_93180yc-ex
- nexus_9516
- nexus_9336pq
- nexus_9364c
- nexus_9504
- nexus_93128tx
- nexus_9372tx
- nexus_93180yc-fx
- nx-os
- nexus_9396px
- nexus_9332pq
- nexus_9348gc-fxp
- nexus_9508
- nexus_9396tx