Action not permitted
Modal body text goes here.
Modal Title
Modal Body
BDU:2023-05163
Vulnerability from fstec - Published: 23.08.2023
VLAI Severity ?
Title
Уязвимость реализации протоколов TACACS и RADIUS (Remote Authentication in Dial-In User Service) операционных систем Cisco NX-OS маршрутизаторов MDS 9000, Nexus 1000, Nexus 1000V, Nexus 1000V, Nexus 3000, Nexus 5500, Nexus 5600, Nexus 6000, Nexus 7000, Nexus 9000, позволяющая нарушителю вызвать отказ в обслуживании
Description
Уязвимость реализации протоколов TACACS и RADIUS (Remote Authentication in Dial-In User Service) операционных систем Cisco NX-OS маршрутизаторов MDS 9000, Nexus 1000, Nexus 1000V, Nexus 1000V, Nexus 3000, Nexus 5500, Nexus 5600, Nexus 6000, Nexus 7000, Nexus 9000 существует из-за недостаточной проверки входных данных. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании
Severity ?
Vendor
Cisco Systems Inc.
Software Name
NX-OS
Software Version
- (NX-OS)
Possible Mitigations
Использование рекомендаций:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m
Reference
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m
CWE
CWE-404
{
"CVSS 2.0": "AV:L/AC:L/Au:N/C:N/I:N/A:C",
"CVSS 3.0": "AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "- (NX-OS)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "23.08.2023",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "05.09.2023",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "05.09.2023",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2023-05163",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2023-20168",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "NX-OS",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Cisco Systems Inc. NX-OS - Nexus 3000 Series, Cisco Systems Inc. NX-OS - Nexus 5500 Platform, Cisco Systems Inc. NX-OS - Nexus 5600 Platform, Cisco Systems Inc. NX-OS - Nexus 6000 Series, Cisco Systems Inc. NX-OS - Nexus 7000 Series, Cisco Systems Inc. NX-OS - Nexus 9000 Series in Standalone NX-OS Mode, Cisco Systems Inc. NX-OS - Cisco MDS 9000 Series Multilayer Switches, Cisco Systems Inc. NX-OS - Nexus 1000 Virtual Edge for VMware vSphere, Cisco Systems Inc. NX-OS - Nexus 1000V Switch for Microsoft Hyper-V, Cisco Systems Inc. NX-OS - Cisco Nexus 1000V Switch for VMware vSphere",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 TACACS \u0438 RADIUS (Remote Authentication in Dial-In User Service) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco NX-OS \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 MDS 9000, Nexus 1000, Nexus 1000V, Nexus 1000V, Nexus 3000, Nexus 5500, Nexus 5600, Nexus 6000, Nexus 7000, Nexus 9000, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043a\u043e\u0440\u0440\u0435\u043a\u0442\u043d\u0430\u044f \u0437\u0430\u0447\u0438\u0441\u0442\u043a\u0430 \u0438\u043b\u0438 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432 (CWE-404)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u043e\u0432 TACACS \u0438 RADIUS (Remote Authentication in Dial-In User Service) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c Cisco NX-OS \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 MDS 9000, Nexus 1000, Nexus 1000V, Nexus 1000V, Nexus 3000, Nexus 5500, Nexus 5600, Nexus 6000, Nexus 7000, Nexus 9000 \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442 \u0438\u0437-\u0437\u0430 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043e\u0447\u043d\u043e\u0439 \u043f\u0440\u043e\u0432\u0435\u0440\u043a\u0438 \u0432\u0445\u043e\u0434\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u0441\u0447\u0435\u0440\u043f\u0430\u043d\u0438\u0435 \u0440\u0435\u0441\u0443\u0440\u0441\u043e\u0432",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-404",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,9)\n\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 7,1)"
}
CVE-2023-20168 (GCVE-0-2023-20168)
Vulnerability from cvelistv5 – Published: 2023-08-23 18:07 – Updated: 2024-08-02 09:05
VLAI?
EPSS
Summary
A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.
Severity ?
7.1 (High)
CWE
- CWE-120 - Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco NX-OS Software |
Affected:
4.2(1)SV1(4)
Affected: 4.2(1)SV1(4a) Affected: 4.2(1)SV1(4b) Affected: 4.2(1)SV1(5.1) Affected: 4.2(1)SV1(5.1a) Affected: 4.2(1)SV1(5.2) Affected: 4.2(1)SV1(5.2b) Affected: 4.2(1)SV2(1.1) Affected: 4.2(1)SV2(1.1a) Affected: 4.2(1)SV2(2.1) Affected: 4.2(1)SV2(2.1a) Affected: 4.2(1)SV2(2.2) Affected: 4.2(1)SV2(2.3) Affected: 5.2(1)SM1(5.1) Affected: 5.2(1)SM1(5.2) Affected: 5.2(1)SM1(5.2a) Affected: 5.2(1)SM1(5.2b) Affected: 5.2(1)SM1(5.2c) Affected: 5.2(1)SM3(1.1) Affected: 5.2(1)SM3(1.1a) Affected: 5.2(1)SM3(1.1b) Affected: 5.2(1)SM3(1.1c) Affected: 5.2(1)SM3(2.1) Affected: 5.2(1)SV3(1.4) Affected: 5.2(1)SV3(1.1) Affected: 5.2(1)SV3(1.3) Affected: 5.2(1)SV3(1.5a) Affected: 5.2(1)SV3(1.5b) Affected: 5.2(1)SV3(1.6) Affected: 5.2(1)SV3(1.10) Affected: 5.2(1)SV3(1.15) Affected: 5.2(1)SV3(2.1) Affected: 5.2(1)SV3(2.5) Affected: 5.2(1)SV3(2.8) Affected: 5.2(1)SV3(3.1) Affected: 5.2(1)SV3(1.2) Affected: 5.2(1)SV3(1.4b) Affected: 5.2(1)SV3(3.15) Affected: 5.2(1)SV3(4.1) Affected: 5.2(1)SV3(4.1a) Affected: 5.2(1)SV3(4.1b) Affected: 5.2(1)SV3(4.1c) Affected: 6.0(2)A3(1) Affected: 6.0(2)A3(2) Affected: 6.0(2)A3(4) Affected: 6.0(2)A4(1) Affected: 6.0(2)A4(2) Affected: 6.0(2)A4(3) Affected: 6.0(2)A4(4) Affected: 6.0(2)A4(5) Affected: 6.0(2)A4(6) Affected: 6.0(2)A6(1) Affected: 6.0(2)A6(1a) Affected: 6.0(2)A6(2) Affected: 6.0(2)A6(2a) Affected: 6.0(2)A6(3) Affected: 6.0(2)A6(3a) Affected: 6.0(2)A6(4) Affected: 6.0(2)A6(4a) Affected: 6.0(2)A6(5) Affected: 6.0(2)A6(5a) Affected: 6.0(2)A6(5b) Affected: 6.0(2)A6(6) Affected: 6.0(2)A6(7) Affected: 6.0(2)A6(8) Affected: 6.0(2)A7(1) Affected: 6.0(2)A7(1a) Affected: 6.0(2)A7(2) Affected: 6.0(2)A7(2a) Affected: 6.0(2)A8(1) Affected: 6.0(2)A8(2) Affected: 6.0(2)A8(3) Affected: 6.0(2)A8(4) Affected: 6.0(2)A8(4a) Affected: 6.0(2)A8(5) Affected: 6.0(2)A8(6) Affected: 6.0(2)A8(7) Affected: 6.0(2)A8(7a) Affected: 6.0(2)A8(7b) Affected: 6.0(2)A8(8) Affected: 6.0(2)A8(9) Affected: 6.0(2)A8(10a) Affected: 6.0(2)A8(10) Affected: 6.0(2)A8(11) Affected: 6.0(2)A8(11a) Affected: 6.0(2)A8(11b) Affected: 6.0(2)U2(1) Affected: 6.0(2)U2(2) Affected: 6.0(2)U2(3) Affected: 6.0(2)U2(4) Affected: 6.0(2)U2(5) Affected: 6.0(2)U2(6) Affected: 6.0(2)U3(1) Affected: 6.0(2)U3(2) Affected: 6.0(2)U3(3) Affected: 6.0(2)U3(4) Affected: 6.0(2)U3(5) Affected: 6.0(2)U3(6) Affected: 6.0(2)U3(7) Affected: 6.0(2)U3(8) Affected: 6.0(2)U3(9) Affected: 6.0(2)U4(1) Affected: 6.0(2)U4(2) Affected: 6.0(2)U4(3) Affected: 6.0(2)U4(4) Affected: 6.0(2)U5(1) Affected: 6.0(2)U5(2) Affected: 6.0(2)U5(3) Affected: 6.0(2)U5(4) Affected: 6.0(2)U6(1) Affected: 6.0(2)U6(2) Affected: 6.0(2)U6(3) Affected: 6.0(2)U6(4) Affected: 6.0(2)U6(5) Affected: 6.0(2)U6(6) Affected: 6.0(2)U6(7) Affected: 6.0(2)U6(8) Affected: 6.0(2)U6(1a) Affected: 6.0(2)U6(2a) Affected: 6.0(2)U6(3a) Affected: 6.0(2)U6(4a) Affected: 6.0(2)U6(5a) Affected: 6.0(2)U6(5b) Affected: 6.0(2)U6(5c) Affected: 6.0(2)U6(9) Affected: 6.0(2)U6(10) Affected: 6.2(2) Affected: 6.2(2a) Affected: 6.2(6) Affected: 6.2(6b) Affected: 6.2(8) Affected: 6.2(8a) Affected: 6.2(8b) Affected: 6.2(10) Affected: 6.2(12) Affected: 6.2(18) Affected: 6.2(16) Affected: 6.2(14) Affected: 6.2(6a) Affected: 6.2(20) Affected: 6.2(1) Affected: 6.2(3) Affected: 6.2(5) Affected: 6.2(5a) Affected: 6.2(5b) Affected: 6.2(7) Affected: 6.2(9) Affected: 6.2(9a) Affected: 6.2(9b) Affected: 6.2(9c) Affected: 6.2(11) Affected: 6.2(11b) Affected: 6.2(11c) Affected: 6.2(11d) Affected: 6.2(11e) Affected: 6.2(13) Affected: 6.2(13a) Affected: 6.2(13b) Affected: 6.2(15) Affected: 6.2(17) Affected: 6.2(19) Affected: 6.2(21) Affected: 6.2(23) Affected: 6.2(20a) Affected: 6.2(25) Affected: 6.2(22) Affected: 6.2(27) Affected: 6.2(29) Affected: 6.2(24) Affected: 6.2(31) Affected: 6.2(24a) Affected: 6.2(33) Affected: 7.0(3)F1(1) Affected: 7.0(3)F2(1) Affected: 7.0(3)F2(2) Affected: 7.0(3)F3(1) Affected: 7.0(3)F3(2) Affected: 7.0(3)F3(3) Affected: 7.0(3)F3(3a) Affected: 7.0(3)F3(4) Affected: 7.0(3)F3(3c) Affected: 7.0(3)F3(5) Affected: 7.0(3)I2(2a) Affected: 7.0(3)I2(2b) Affected: 7.0(3)I2(2c) Affected: 7.0(3)I2(2d) Affected: 7.0(3)I2(2e) Affected: 7.0(3)I2(3) Affected: 7.0(3)I2(4) Affected: 7.0(3)I2(5) Affected: 7.0(3)I2(1) Affected: 7.0(3)I2(1a) Affected: 7.0(3)I2(2) Affected: 7.0(3)I3(1) Affected: 7.0(3)I4(1) Affected: 7.0(3)I4(2) Affected: 7.0(3)I4(3) Affected: 7.0(3)I4(4) Affected: 7.0(3)I4(5) Affected: 7.0(3)I4(6) Affected: 7.0(3)I4(7) Affected: 7.0(3)I4(8) Affected: 7.0(3)I4(8a) Affected: 7.0(3)I4(8b) Affected: 7.0(3)I4(8z) Affected: 7.0(3)I4(9) Affected: 7.0(3)I5(1) Affected: 7.0(3)I5(2) Affected: 7.0(3)I6(1) Affected: 7.0(3)I6(2) Affected: 7.0(3)I7(1) Affected: 7.0(3)I7(2) Affected: 7.0(3)I7(3) Affected: 7.0(3)I7(4) Affected: 7.0(3)I7(5) Affected: 7.0(3)I7(5a) Affected: 7.0(3)I7(6) Affected: 7.0(3)I7(7) Affected: 7.0(3)I7(8) Affected: 7.0(3)I7(9) Affected: 7.0(3)I7(10) Affected: 7.1(0)N1(1a) Affected: 7.1(0)N1(1b) Affected: 7.1(0)N1(1) Affected: 7.1(1)N1(1) Affected: 7.1(2)N1(1) Affected: 7.1(3)N1(1) Affected: 7.1(3)N1(2) Affected: 7.1(4)N1(1) Affected: 7.1(5)N1(1) Affected: 7.1(5)N1(1b) Affected: 7.2(0)D1(1) Affected: 7.2(1)D1(1) Affected: 7.2(2)D1(2) Affected: 7.2(2)D1(1) Affected: 7.3(0)D1(1) Affected: 7.3(0)DX(1) Affected: 7.3(0)DY(1) Affected: 7.3(0)N1(1) Affected: 7.3(1)D1(1) Affected: 7.3(1)DY(1) Affected: 7.3(1)N1(1) Affected: 7.3(2)D1(1) Affected: 7.3(2)D1(2) Affected: 7.3(2)D1(3) Affected: 7.3(2)D1(3a) Affected: 7.3(2)N1(1) Affected: 7.3(3)N1(1) Affected: 8.0(1) Affected: 8.1(1) Affected: 8.1(2) Affected: 8.1(2a) Affected: 8.1(1a) Affected: 8.1(1b) Affected: 8.2(1) Affected: 8.2(2) Affected: 8.2(3) Affected: 8.2(4) Affected: 8.2(5) Affected: 8.2(6) Affected: 8.2(7) Affected: 8.2(7a) Affected: 8.2(8) Affected: 8.2(9) Affected: 8.3(1) Affected: 8.3(2) Affected: 9.2(1) Affected: 9.2(2) Affected: 9.2(2t) Affected: 9.2(3) Affected: 9.2(4) Affected: 9.2(2v) Affected: 9.2(1a) Affected: 7.3(4)N1(1) Affected: 7.3(3)D1(1) Affected: 7.3(4)D1(1) Affected: 7.3(5)N1(1) Affected: 5.2(1)SK3(1.1) Affected: 5.2(1)SK3(2.1) Affected: 5.2(1)SK3(2.2) Affected: 5.2(1)SK3(2.2b) Affected: 5.2(1)SK3(2.1a) Affected: 5.2(1)SV5(1.1) Affected: 5.2(1)SV5(1.2) Affected: 5.2(1)SV5(1.3) Affected: 5.2(1)SV5(1.3a) Affected: 5.2(1)SV5(1.3b) Affected: 5.2(1)SV5(1.3c) Affected: 8.4(1) Affected: 8.4(1a) Affected: 8.4(2) Affected: 8.4(2a) Affected: 8.4(3) Affected: 8.4(2b) Affected: 8.4(4) Affected: 8.4(2c) Affected: 8.4(4a) Affected: 8.4(5) Affected: 8.4(2d) Affected: 8.4(6) Affected: 8.4(2e) Affected: 8.4(6a) Affected: 8.4(7) Affected: 8.4(2f) Affected: 9.3(1) Affected: 9.3(2) Affected: 9.3(3) Affected: 9.3(4) Affected: 9.3(5) Affected: 9.3(6) Affected: 9.3(7) Affected: 9.3(7a) Affected: 9.3(8) Affected: 9.3(9) Affected: 9.3(10) Affected: 9.3(11) Affected: 7.3(6)N1(1) Affected: 7.3(5)D1(1) Affected: 7.3(7)N1(1) Affected: 7.3(7)N1(1a) Affected: 7.3(7)N1(1b) Affected: 7.3(6)D1(1) Affected: 7.3(8)N1(1) Affected: 7.3(7)D1(1) Affected: 7.3(9)N1(1) Affected: 10.1(1) Affected: 10.1(2) Affected: 10.1(2t) Affected: 8.5(1) Affected: 7.3(10)N1(1) Affected: 7.3(8)D1(1) Affected: 10.2(1) Affected: 10.2(1q) Affected: 10.2(2) Affected: 10.2(3) Affected: 10.2(3t) Affected: 10.2(4) Affected: 10.2(5) Affected: 7.3(9)D1(1) Affected: 7.3(11)N1(1) Affected: 7.3(12)N1(1) Affected: 10.3(1) Affected: 10.3(2) Affected: 7.3(13)N1(1) |
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T09:05:35.038Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "cisco-sa-nxos-remoteauth-dos-XB6pv74m",
"tags": [
"x_transferred"
],
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco NX-OS Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "4.2(1)SV1(4)"
},
{
"status": "affected",
"version": "4.2(1)SV1(4a)"
},
{
"status": "affected",
"version": "4.2(1)SV1(4b)"
},
{
"status": "affected",
"version": "4.2(1)SV1(5.1)"
},
{
"status": "affected",
"version": "4.2(1)SV1(5.1a)"
},
{
"status": "affected",
"version": "4.2(1)SV1(5.2)"
},
{
"status": "affected",
"version": "4.2(1)SV1(5.2b)"
},
{
"status": "affected",
"version": "4.2(1)SV2(1.1)"
},
{
"status": "affected",
"version": "4.2(1)SV2(1.1a)"
},
{
"status": "affected",
"version": "4.2(1)SV2(2.1)"
},
{
"status": "affected",
"version": "4.2(1)SV2(2.1a)"
},
{
"status": "affected",
"version": "4.2(1)SV2(2.2)"
},
{
"status": "affected",
"version": "4.2(1)SV2(2.3)"
},
{
"status": "affected",
"version": "5.2(1)SM1(5.1)"
},
{
"status": "affected",
"version": "5.2(1)SM1(5.2)"
},
{
"status": "affected",
"version": "5.2(1)SM1(5.2a)"
},
{
"status": "affected",
"version": "5.2(1)SM1(5.2b)"
},
{
"status": "affected",
"version": "5.2(1)SM1(5.2c)"
},
{
"status": "affected",
"version": "5.2(1)SM3(1.1)"
},
{
"status": "affected",
"version": "5.2(1)SM3(1.1a)"
},
{
"status": "affected",
"version": "5.2(1)SM3(1.1b)"
},
{
"status": "affected",
"version": "5.2(1)SM3(1.1c)"
},
{
"status": "affected",
"version": "5.2(1)SM3(2.1)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.4)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.1)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.3)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.5a)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.5b)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.6)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.10)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.15)"
},
{
"status": "affected",
"version": "5.2(1)SV3(2.1)"
},
{
"status": "affected",
"version": "5.2(1)SV3(2.5)"
},
{
"status": "affected",
"version": "5.2(1)SV3(2.8)"
},
{
"status": "affected",
"version": "5.2(1)SV3(3.1)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.2)"
},
{
"status": "affected",
"version": "5.2(1)SV3(1.4b)"
},
{
"status": "affected",
"version": "5.2(1)SV3(3.15)"
},
{
"status": "affected",
"version": "5.2(1)SV3(4.1)"
},
{
"status": "affected",
"version": "5.2(1)SV3(4.1a)"
},
{
"status": "affected",
"version": "5.2(1)SV3(4.1b)"
},
{
"status": "affected",
"version": "5.2(1)SV3(4.1c)"
},
{
"status": "affected",
"version": "6.0(2)A3(1)"
},
{
"status": "affected",
"version": "6.0(2)A3(2)"
},
{
"status": "affected",
"version": "6.0(2)A3(4)"
},
{
"status": "affected",
"version": "6.0(2)A4(1)"
},
{
"status": "affected",
"version": "6.0(2)A4(2)"
},
{
"status": "affected",
"version": "6.0(2)A4(3)"
},
{
"status": "affected",
"version": "6.0(2)A4(4)"
},
{
"status": "affected",
"version": "6.0(2)A4(5)"
},
{
"status": "affected",
"version": "6.0(2)A4(6)"
},
{
"status": "affected",
"version": "6.0(2)A6(1)"
},
{
"status": "affected",
"version": "6.0(2)A6(1a)"
},
{
"status": "affected",
"version": "6.0(2)A6(2)"
},
{
"status": "affected",
"version": "6.0(2)A6(2a)"
},
{
"status": "affected",
"version": "6.0(2)A6(3)"
},
{
"status": "affected",
"version": "6.0(2)A6(3a)"
},
{
"status": "affected",
"version": "6.0(2)A6(4)"
},
{
"status": "affected",
"version": "6.0(2)A6(4a)"
},
{
"status": "affected",
"version": "6.0(2)A6(5)"
},
{
"status": "affected",
"version": "6.0(2)A6(5a)"
},
{
"status": "affected",
"version": "6.0(2)A6(5b)"
},
{
"status": "affected",
"version": "6.0(2)A6(6)"
},
{
"status": "affected",
"version": "6.0(2)A6(7)"
},
{
"status": "affected",
"version": "6.0(2)A6(8)"
},
{
"status": "affected",
"version": "6.0(2)A7(1)"
},
{
"status": "affected",
"version": "6.0(2)A7(1a)"
},
{
"status": "affected",
"version": "6.0(2)A7(2)"
},
{
"status": "affected",
"version": "6.0(2)A7(2a)"
},
{
"status": "affected",
"version": "6.0(2)A8(1)"
},
{
"status": "affected",
"version": "6.0(2)A8(2)"
},
{
"status": "affected",
"version": "6.0(2)A8(3)"
},
{
"status": "affected",
"version": "6.0(2)A8(4)"
},
{
"status": "affected",
"version": "6.0(2)A8(4a)"
},
{
"status": "affected",
"version": "6.0(2)A8(5)"
},
{
"status": "affected",
"version": "6.0(2)A8(6)"
},
{
"status": "affected",
"version": "6.0(2)A8(7)"
},
{
"status": "affected",
"version": "6.0(2)A8(7a)"
},
{
"status": "affected",
"version": "6.0(2)A8(7b)"
},
{
"status": "affected",
"version": "6.0(2)A8(8)"
},
{
"status": "affected",
"version": "6.0(2)A8(9)"
},
{
"status": "affected",
"version": "6.0(2)A8(10a)"
},
{
"status": "affected",
"version": "6.0(2)A8(10)"
},
{
"status": "affected",
"version": "6.0(2)A8(11)"
},
{
"status": "affected",
"version": "6.0(2)A8(11a)"
},
{
"status": "affected",
"version": "6.0(2)A8(11b)"
},
{
"status": "affected",
"version": "6.0(2)U2(1)"
},
{
"status": "affected",
"version": "6.0(2)U2(2)"
},
{
"status": "affected",
"version": "6.0(2)U2(3)"
},
{
"status": "affected",
"version": "6.0(2)U2(4)"
},
{
"status": "affected",
"version": "6.0(2)U2(5)"
},
{
"status": "affected",
"version": "6.0(2)U2(6)"
},
{
"status": "affected",
"version": "6.0(2)U3(1)"
},
{
"status": "affected",
"version": "6.0(2)U3(2)"
},
{
"status": "affected",
"version": "6.0(2)U3(3)"
},
{
"status": "affected",
"version": "6.0(2)U3(4)"
},
{
"status": "affected",
"version": "6.0(2)U3(5)"
},
{
"status": "affected",
"version": "6.0(2)U3(6)"
},
{
"status": "affected",
"version": "6.0(2)U3(7)"
},
{
"status": "affected",
"version": "6.0(2)U3(8)"
},
{
"status": "affected",
"version": "6.0(2)U3(9)"
},
{
"status": "affected",
"version": "6.0(2)U4(1)"
},
{
"status": "affected",
"version": "6.0(2)U4(2)"
},
{
"status": "affected",
"version": "6.0(2)U4(3)"
},
{
"status": "affected",
"version": "6.0(2)U4(4)"
},
{
"status": "affected",
"version": "6.0(2)U5(1)"
},
{
"status": "affected",
"version": "6.0(2)U5(2)"
},
{
"status": "affected",
"version": "6.0(2)U5(3)"
},
{
"status": "affected",
"version": "6.0(2)U5(4)"
},
{
"status": "affected",
"version": "6.0(2)U6(1)"
},
{
"status": "affected",
"version": "6.0(2)U6(2)"
},
{
"status": "affected",
"version": "6.0(2)U6(3)"
},
{
"status": "affected",
"version": "6.0(2)U6(4)"
},
{
"status": "affected",
"version": "6.0(2)U6(5)"
},
{
"status": "affected",
"version": "6.0(2)U6(6)"
},
{
"status": "affected",
"version": "6.0(2)U6(7)"
},
{
"status": "affected",
"version": "6.0(2)U6(8)"
},
{
"status": "affected",
"version": "6.0(2)U6(1a)"
},
{
"status": "affected",
"version": "6.0(2)U6(2a)"
},
{
"status": "affected",
"version": "6.0(2)U6(3a)"
},
{
"status": "affected",
"version": "6.0(2)U6(4a)"
},
{
"status": "affected",
"version": "6.0(2)U6(5a)"
},
{
"status": "affected",
"version": "6.0(2)U6(5b)"
},
{
"status": "affected",
"version": "6.0(2)U6(5c)"
},
{
"status": "affected",
"version": "6.0(2)U6(9)"
},
{
"status": "affected",
"version": "6.0(2)U6(10)"
},
{
"status": "affected",
"version": "6.2(2)"
},
{
"status": "affected",
"version": "6.2(2a)"
},
{
"status": "affected",
"version": "6.2(6)"
},
{
"status": "affected",
"version": "6.2(6b)"
},
{
"status": "affected",
"version": "6.2(8)"
},
{
"status": "affected",
"version": "6.2(8a)"
},
{
"status": "affected",
"version": "6.2(8b)"
},
{
"status": "affected",
"version": "6.2(10)"
},
{
"status": "affected",
"version": "6.2(12)"
},
{
"status": "affected",
"version": "6.2(18)"
},
{
"status": "affected",
"version": "6.2(16)"
},
{
"status": "affected",
"version": "6.2(14)"
},
{
"status": "affected",
"version": "6.2(6a)"
},
{
"status": "affected",
"version": "6.2(20)"
},
{
"status": "affected",
"version": "6.2(1)"
},
{
"status": "affected",
"version": "6.2(3)"
},
{
"status": "affected",
"version": "6.2(5)"
},
{
"status": "affected",
"version": "6.2(5a)"
},
{
"status": "affected",
"version": "6.2(5b)"
},
{
"status": "affected",
"version": "6.2(7)"
},
{
"status": "affected",
"version": "6.2(9)"
},
{
"status": "affected",
"version": "6.2(9a)"
},
{
"status": "affected",
"version": "6.2(9b)"
},
{
"status": "affected",
"version": "6.2(9c)"
},
{
"status": "affected",
"version": "6.2(11)"
},
{
"status": "affected",
"version": "6.2(11b)"
},
{
"status": "affected",
"version": "6.2(11c)"
},
{
"status": "affected",
"version": "6.2(11d)"
},
{
"status": "affected",
"version": "6.2(11e)"
},
{
"status": "affected",
"version": "6.2(13)"
},
{
"status": "affected",
"version": "6.2(13a)"
},
{
"status": "affected",
"version": "6.2(13b)"
},
{
"status": "affected",
"version": "6.2(15)"
},
{
"status": "affected",
"version": "6.2(17)"
},
{
"status": "affected",
"version": "6.2(19)"
},
{
"status": "affected",
"version": "6.2(21)"
},
{
"status": "affected",
"version": "6.2(23)"
},
{
"status": "affected",
"version": "6.2(20a)"
},
{
"status": "affected",
"version": "6.2(25)"
},
{
"status": "affected",
"version": "6.2(22)"
},
{
"status": "affected",
"version": "6.2(27)"
},
{
"status": "affected",
"version": "6.2(29)"
},
{
"status": "affected",
"version": "6.2(24)"
},
{
"status": "affected",
"version": "6.2(31)"
},
{
"status": "affected",
"version": "6.2(24a)"
},
{
"status": "affected",
"version": "6.2(33)"
},
{
"status": "affected",
"version": "7.0(3)F1(1)"
},
{
"status": "affected",
"version": "7.0(3)F2(1)"
},
{
"status": "affected",
"version": "7.0(3)F2(2)"
},
{
"status": "affected",
"version": "7.0(3)F3(1)"
},
{
"status": "affected",
"version": "7.0(3)F3(2)"
},
{
"status": "affected",
"version": "7.0(3)F3(3)"
},
{
"status": "affected",
"version": "7.0(3)F3(3a)"
},
{
"status": "affected",
"version": "7.0(3)F3(4)"
},
{
"status": "affected",
"version": "7.0(3)F3(3c)"
},
{
"status": "affected",
"version": "7.0(3)F3(5)"
},
{
"status": "affected",
"version": "7.0(3)I2(2a)"
},
{
"status": "affected",
"version": "7.0(3)I2(2b)"
},
{
"status": "affected",
"version": "7.0(3)I2(2c)"
},
{
"status": "affected",
"version": "7.0(3)I2(2d)"
},
{
"status": "affected",
"version": "7.0(3)I2(2e)"
},
{
"status": "affected",
"version": "7.0(3)I2(3)"
},
{
"status": "affected",
"version": "7.0(3)I2(4)"
},
{
"status": "affected",
"version": "7.0(3)I2(5)"
},
{
"status": "affected",
"version": "7.0(3)I2(1)"
},
{
"status": "affected",
"version": "7.0(3)I2(1a)"
},
{
"status": "affected",
"version": "7.0(3)I2(2)"
},
{
"status": "affected",
"version": "7.0(3)I3(1)"
},
{
"status": "affected",
"version": "7.0(3)I4(1)"
},
{
"status": "affected",
"version": "7.0(3)I4(2)"
},
{
"status": "affected",
"version": "7.0(3)I4(3)"
},
{
"status": "affected",
"version": "7.0(3)I4(4)"
},
{
"status": "affected",
"version": "7.0(3)I4(5)"
},
{
"status": "affected",
"version": "7.0(3)I4(6)"
},
{
"status": "affected",
"version": "7.0(3)I4(7)"
},
{
"status": "affected",
"version": "7.0(3)I4(8)"
},
{
"status": "affected",
"version": "7.0(3)I4(8a)"
},
{
"status": "affected",
"version": "7.0(3)I4(8b)"
},
{
"status": "affected",
"version": "7.0(3)I4(8z)"
},
{
"status": "affected",
"version": "7.0(3)I4(9)"
},
{
"status": "affected",
"version": "7.0(3)I5(1)"
},
{
"status": "affected",
"version": "7.0(3)I5(2)"
},
{
"status": "affected",
"version": "7.0(3)I6(1)"
},
{
"status": "affected",
"version": "7.0(3)I6(2)"
},
{
"status": "affected",
"version": "7.0(3)I7(1)"
},
{
"status": "affected",
"version": "7.0(3)I7(2)"
},
{
"status": "affected",
"version": "7.0(3)I7(3)"
},
{
"status": "affected",
"version": "7.0(3)I7(4)"
},
{
"status": "affected",
"version": "7.0(3)I7(5)"
},
{
"status": "affected",
"version": "7.0(3)I7(5a)"
},
{
"status": "affected",
"version": "7.0(3)I7(6)"
},
{
"status": "affected",
"version": "7.0(3)I7(7)"
},
{
"status": "affected",
"version": "7.0(3)I7(8)"
},
{
"status": "affected",
"version": "7.0(3)I7(9)"
},
{
"status": "affected",
"version": "7.0(3)I7(10)"
},
{
"status": "affected",
"version": "7.1(0)N1(1a)"
},
{
"status": "affected",
"version": "7.1(0)N1(1b)"
},
{
"status": "affected",
"version": "7.1(0)N1(1)"
},
{
"status": "affected",
"version": "7.1(1)N1(1)"
},
{
"status": "affected",
"version": "7.1(2)N1(1)"
},
{
"status": "affected",
"version": "7.1(3)N1(1)"
},
{
"status": "affected",
"version": "7.1(3)N1(2)"
},
{
"status": "affected",
"version": "7.1(4)N1(1)"
},
{
"status": "affected",
"version": "7.1(5)N1(1)"
},
{
"status": "affected",
"version": "7.1(5)N1(1b)"
},
{
"status": "affected",
"version": "7.2(0)D1(1)"
},
{
"status": "affected",
"version": "7.2(1)D1(1)"
},
{
"status": "affected",
"version": "7.2(2)D1(2)"
},
{
"status": "affected",
"version": "7.2(2)D1(1)"
},
{
"status": "affected",
"version": "7.3(0)D1(1)"
},
{
"status": "affected",
"version": "7.3(0)DX(1)"
},
{
"status": "affected",
"version": "7.3(0)DY(1)"
},
{
"status": "affected",
"version": "7.3(0)N1(1)"
},
{
"status": "affected",
"version": "7.3(1)D1(1)"
},
{
"status": "affected",
"version": "7.3(1)DY(1)"
},
{
"status": "affected",
"version": "7.3(1)N1(1)"
},
{
"status": "affected",
"version": "7.3(2)D1(1)"
},
{
"status": "affected",
"version": "7.3(2)D1(2)"
},
{
"status": "affected",
"version": "7.3(2)D1(3)"
},
{
"status": "affected",
"version": "7.3(2)D1(3a)"
},
{
"status": "affected",
"version": "7.3(2)N1(1)"
},
{
"status": "affected",
"version": "7.3(3)N1(1)"
},
{
"status": "affected",
"version": "8.0(1)"
},
{
"status": "affected",
"version": "8.1(1)"
},
{
"status": "affected",
"version": "8.1(2)"
},
{
"status": "affected",
"version": "8.1(2a)"
},
{
"status": "affected",
"version": "8.1(1a)"
},
{
"status": "affected",
"version": "8.1(1b)"
},
{
"status": "affected",
"version": "8.2(1)"
},
{
"status": "affected",
"version": "8.2(2)"
},
{
"status": "affected",
"version": "8.2(3)"
},
{
"status": "affected",
"version": "8.2(4)"
},
{
"status": "affected",
"version": "8.2(5)"
},
{
"status": "affected",
"version": "8.2(6)"
},
{
"status": "affected",
"version": "8.2(7)"
},
{
"status": "affected",
"version": "8.2(7a)"
},
{
"status": "affected",
"version": "8.2(8)"
},
{
"status": "affected",
"version": "8.2(9)"
},
{
"status": "affected",
"version": "8.3(1)"
},
{
"status": "affected",
"version": "8.3(2)"
},
{
"status": "affected",
"version": "9.2(1)"
},
{
"status": "affected",
"version": "9.2(2)"
},
{
"status": "affected",
"version": "9.2(2t)"
},
{
"status": "affected",
"version": "9.2(3)"
},
{
"status": "affected",
"version": "9.2(4)"
},
{
"status": "affected",
"version": "9.2(2v)"
},
{
"status": "affected",
"version": "9.2(1a)"
},
{
"status": "affected",
"version": "7.3(4)N1(1)"
},
{
"status": "affected",
"version": "7.3(3)D1(1)"
},
{
"status": "affected",
"version": "7.3(4)D1(1)"
},
{
"status": "affected",
"version": "7.3(5)N1(1)"
},
{
"status": "affected",
"version": "5.2(1)SK3(1.1)"
},
{
"status": "affected",
"version": "5.2(1)SK3(2.1)"
},
{
"status": "affected",
"version": "5.2(1)SK3(2.2)"
},
{
"status": "affected",
"version": "5.2(1)SK3(2.2b)"
},
{
"status": "affected",
"version": "5.2(1)SK3(2.1a)"
},
{
"status": "affected",
"version": "5.2(1)SV5(1.1)"
},
{
"status": "affected",
"version": "5.2(1)SV5(1.2)"
},
{
"status": "affected",
"version": "5.2(1)SV5(1.3)"
},
{
"status": "affected",
"version": "5.2(1)SV5(1.3a)"
},
{
"status": "affected",
"version": "5.2(1)SV5(1.3b)"
},
{
"status": "affected",
"version": "5.2(1)SV5(1.3c)"
},
{
"status": "affected",
"version": "8.4(1)"
},
{
"status": "affected",
"version": "8.4(1a)"
},
{
"status": "affected",
"version": "8.4(2)"
},
{
"status": "affected",
"version": "8.4(2a)"
},
{
"status": "affected",
"version": "8.4(3)"
},
{
"status": "affected",
"version": "8.4(2b)"
},
{
"status": "affected",
"version": "8.4(4)"
},
{
"status": "affected",
"version": "8.4(2c)"
},
{
"status": "affected",
"version": "8.4(4a)"
},
{
"status": "affected",
"version": "8.4(5)"
},
{
"status": "affected",
"version": "8.4(2d)"
},
{
"status": "affected",
"version": "8.4(6)"
},
{
"status": "affected",
"version": "8.4(2e)"
},
{
"status": "affected",
"version": "8.4(6a)"
},
{
"status": "affected",
"version": "8.4(7)"
},
{
"status": "affected",
"version": "8.4(2f)"
},
{
"status": "affected",
"version": "9.3(1)"
},
{
"status": "affected",
"version": "9.3(2)"
},
{
"status": "affected",
"version": "9.3(3)"
},
{
"status": "affected",
"version": "9.3(4)"
},
{
"status": "affected",
"version": "9.3(5)"
},
{
"status": "affected",
"version": "9.3(6)"
},
{
"status": "affected",
"version": "9.3(7)"
},
{
"status": "affected",
"version": "9.3(7a)"
},
{
"status": "affected",
"version": "9.3(8)"
},
{
"status": "affected",
"version": "9.3(9)"
},
{
"status": "affected",
"version": "9.3(10)"
},
{
"status": "affected",
"version": "9.3(11)"
},
{
"status": "affected",
"version": "7.3(6)N1(1)"
},
{
"status": "affected",
"version": "7.3(5)D1(1)"
},
{
"status": "affected",
"version": "7.3(7)N1(1)"
},
{
"status": "affected",
"version": "7.3(7)N1(1a)"
},
{
"status": "affected",
"version": "7.3(7)N1(1b)"
},
{
"status": "affected",
"version": "7.3(6)D1(1)"
},
{
"status": "affected",
"version": "7.3(8)N1(1)"
},
{
"status": "affected",
"version": "7.3(7)D1(1)"
},
{
"status": "affected",
"version": "7.3(9)N1(1)"
},
{
"status": "affected",
"version": "10.1(1)"
},
{
"status": "affected",
"version": "10.1(2)"
},
{
"status": "affected",
"version": "10.1(2t)"
},
{
"status": "affected",
"version": "8.5(1)"
},
{
"status": "affected",
"version": "7.3(10)N1(1)"
},
{
"status": "affected",
"version": "7.3(8)D1(1)"
},
{
"status": "affected",
"version": "10.2(1)"
},
{
"status": "affected",
"version": "10.2(1q)"
},
{
"status": "affected",
"version": "10.2(2)"
},
{
"status": "affected",
"version": "10.2(3)"
},
{
"status": "affected",
"version": "10.2(3t)"
},
{
"status": "affected",
"version": "10.2(4)"
},
{
"status": "affected",
"version": "10.2(5)"
},
{
"status": "affected",
"version": "7.3(9)D1(1)"
},
{
"status": "affected",
"version": "7.3(11)N1(1)"
},
{
"status": "affected",
"version": "7.3(12)N1(1)"
},
{
"status": "affected",
"version": "10.3(1)"
},
{
"status": "affected",
"version": "10.3(2)"
},
{
"status": "affected",
"version": "7.3(13)N1(1)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. "
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.1,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H",
"version": "3.1"
},
"format": "cvssV3_1"
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-120",
"description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)",
"lang": "en",
"type": "cwe"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-25T16:57:48.712Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-nxos-remoteauth-dos-XB6pv74m",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m"
}
],
"source": {
"advisory": "cisco-sa-nxos-remoteauth-dos-XB6pv74m",
"defects": [
"CSCwe72368",
"CSCwe72670",
"CSCwe72648",
"CSCwe72673",
"CSCwe72674"
],
"discovery": "EXTERNAL"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2023-20168",
"datePublished": "2023-08-23T18:07:53.428Z",
"dateReserved": "2022-10-27T18:47:50.362Z",
"dateUpdated": "2024-08-02T09:05:35.038Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Show additional events:
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…