Show plain JSON{"id": "CVE-2023-20169", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 7.4, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 2.8}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 7.4, "attackVector": "ADJACENT_NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 2.8}]}, "published": "2023-08-23T19:15:07.893", "references": [{"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-n3_9k-isis-dos-FTCXB4Vb", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}, {"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-n3_9k-isis-dos-FTCXB4Vb", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-788"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-20"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco NX-OS Software for the Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload.\r\n\r This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the unexpected restart of the IS-IS process, which could cause the affected device to reload. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2 adjacent to the affected device."}], "lastModified": "2024-11-21T07:40:44.107", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:nx-os:10.3\\(2\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8CE0E36D-08A6-48D5-A364-AC066F30F3CB"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FC2A6C31-438A-4CF5-A3F3-364B1672EB7D"}, {"criteria": "cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4E930332-CDDD-48D5-93BC-C22D693BBFA2"}, {"criteria": "cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7BF4B8FE-E134-4491-B5C2-C1CFEB64731B"}, {"criteria": "cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F4226DA0-9371-401C-8247-E6E636A116C3"}, {"criteria": "cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7664666F-BCE4-4799-AEEA-3A73E6AD33F4"}, {"criteria": "cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B3293438-3D18-45A2-B093-2C3F65783336"}, {"criteria": "cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8F43B770-D96C-44EA-BC12-9F39FC4317B9"}, {"criteria": "cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384"}, {"criteria": "cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CED628B5-97A8-4B26-AA40-BEC854982157"}, {"criteria": "cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7BB9DD73-E31D-4921-A6D6-E14E04703588"}, {"criteria": "cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "4532F513-0543-4960-9877-01F23CA7BA1B"}, {"criteria": "cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0B43502B-FD53-465A-B60F-6A359C6ACD99"}, {"criteria": "cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F3229124-B097-4AAC-8ACD-2F9C89DCC3AB"}, {"criteria": "cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1C84D24C-2256-42AF-898A-221EBE9FE1E4"}, {"criteria": "cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "24FBE87B-8A4F-43A8-98A3-4A7D9C630937"}, {"criteria": "cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6ACD09AC-8B28-4ACB-967B-AB3D450BC137"}, {"criteria": "cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7D397349-CCC6-479B-9273-FB1FFF4F34F2"}, {"criteria": "cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DC7286A7-780F-4A45-940A-4AD5C9D0F201"}, {"criteria": "cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "CA52D5C1-13D8-4D23-B022-954CCEF491F1"}, {"criteria": "cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5F7AF8D7-431B-43CE-840F-CC0817D159C0"}, {"criteria": "cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DAC204C8-1A5A-4E85-824E-DC9B8F6A802D"}, {"criteria": "cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EAF5AF71-15DF-4151-A1CF-E138A7103FC8"}, {"criteria": "cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "10F80A72-AD54-4699-B8AE-82715F0B58E2"}, {"criteria": "cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9354B6A2-D7D6-442E-BF4C-FE8A336D9E94"}, {"criteria": "cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "088C0323-683A-44F5-8D42-FF6EC85D080E"}, {"criteria": "cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "74CB4002-7636-4382-B33E-FBA060A13C34"}, {"criteria": "cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "10CEBF73-3EE0-459A-86C5-F8F6243FE27C"}, {"criteria": "cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "95D2C4C3-65CE-4612-A027-AF70CEFC3233"}, {"criteria": "cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "83DA8BFA-D7A2-476C-A6F5-CAE610033BC2"}, {"criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B"}, {"criteria": "cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D8D5D5E2-B40B-475D-9EF3-8441016E37E9"}, {"criteria": "cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "768BE390-5ED5-48A7-9E80-C4DE8BA979B1"}, {"criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6"}, {"criteria": "cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7E02DC82-0D26-436F-BA64-73C958932B0A"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}