Cisco NX-OS 7.0(3)I3(0.170) on Nexus 9000 Telnet memory corruption
CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
5.1 | $0-$5k | 0.00 |
A vulnerability classified as problematic has been found in Cisco NX-OS 7.0(3)I3(0.170) on Nexus 9000 (Router Operating System). Affected is an unknown part of the component Telnet. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on availability. CVE summarizes:
A Denial of Service vulnerability in the Telnet remote login functionality of Cisco NX-OS Software running on Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote attacker to cause a Telnet process used for login to terminate unexpectedly and the login attempt to fail. There is no impact to user traffic flowing through the device. Affected Products: This vulnerability affects Cisco Nexus 9000 Series Switches that are running Cisco NX-OS Software and are configured to allow remote Telnet connections to the device. More Information: CSCux46778. Known Affected Releases: 7.0(3)I3(0.170). Known Fixed Releases: 7.0(3)I3(1) 7.0(3)I3(0.257) 7.0(3)I3(0.255) 7.0(3)I2(2e) 7.0(3)F1(1.22) 7.0(3)F1(1).
The bug was discovered 03/15/2017. The weakness was disclosed 03/17/2017 with Cisco as cisco-sa-20170315-nss as confirmed advisory (Website). The advisory is available at tools.cisco.com. This vulnerability is traded as CVE-2017-3878 since 12/21/2016. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. The technical details are unknown and an exploit is not available. The structure of the vulnerability defines a possible price range of USD $0-$5k at the moment (estimation calculated on 09/10/2020).
The vulnerability scanner Nessus provides a plugin with the ID 99371 (Cisco NX-OS Telnet Packet Header Handling Remote DoS (cisco-sa-20170315-nss)), which helps to determine the existence of the flaw in a target environment. It is assigned to the family CISCO and running in the context c. The commercial vulnerability scanner Qualys is able to test this issue with plugin 316092 (Cisco Nexus 9000 Series Switches Telnet Login Denial of Service Vulnerability (cisco-sa-20170315-nss)).
Upgrading to version 7.0(3)I3(1), 7.0(3)I3(0.257), 7.0(3)I3(0.255), 7.0(3)I2(2e), 7.0(3)F1(1.22) or 7.0(3)F1(1) eliminates this vulnerability. A possible mitigation has been published even before and not after the disclosure of the vulnerability.
The vulnerability is also documented in the vulnerability database at Tenable (99371). The entries 98263 and 98260 are pretty similar.
Product
Type
Vendor
Name
Version
License
Support
- end of life (old version)
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 5.3VulDB Meta Temp Score: 5.2
VulDB Base Score: 5.3
VulDB Temp Score: 5.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 5.3
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Nessus ID: 99371
Nessus Name: Cisco NX-OS Telnet Packet Header Handling Remote DoS (cisco-sa-20170315-nss)
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
OpenVAS ID: 103402
OpenVAS Name: Cisco Nexus 9000 Series Switches Telnet Login Denial of Service Vulnerability
OpenVAS File: 🔍
OpenVAS Family: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: NX-OS 7.0(3)I3(1)/7.0(3)I3(0.257)/7.0(3)I3(0.255)/7.0(3)I2(2e)/7.0(3)F1(1.22)/7.0(3)F1(1)
Timeline
12/21/2016 🔍03/15/2017 🔍
03/15/2017 🔍
03/15/2017 🔍
03/17/2017 🔍
03/17/2017 🔍
03/18/2017 🔍
04/14/2017 🔍
09/10/2020 🔍
Sources
Vendor: cisco.comAdvisory: cisco-sa-20170315-nss
Organization: Cisco
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2017-3878 (🔍)
SecurityFocus: 96927 - Cisco NX-OS Software CVE-2017-3878 Remote Denial of Service Vulnerability
OSVDB: - CVE-2017-3878 - Cisco - Nexus 9000 - Denial of Service Issue
See also: 🔍
Entry
Created: 03/18/2017 02:58Updated: 09/10/2020 07:59
Changes: 03/18/2017 02:58 (77), 09/10/2020 07:59 (7)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.