Vulnerability Details : CVE-2023-20089
A vulnerability in the Link Layer Discovery Protocol (LLDP) feature for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated, adjacent attacker to cause a memory leak, which could result in an unexpected reload of the device. This vulnerability is due to incorrect error checking when parsing ingress LLDP packets. An attacker could exploit this vulnerability by sending a steady stream of crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause a memory leak, which could result in a denial of service (DoS) condition when the device unexpectedly reloads. Note: This vulnerability cannot be exploited by transit traffic through the device. The crafted LLDP packet must be targeted to a directly connected interface, and the attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). In addition, the attack surface for this vulnerability can be reduced by disabling LLDP on interfaces where it is not required.
Vulnerability category: Denial of service
Products affected by CVE-2023-20089
- cpe:2.3:o:cisco:nx-os:15.2\(1g\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(2e\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(2f\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(2g\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(2h\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(3e\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(3f\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(3g\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(4d\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(4e\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(4f\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(5c\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(5d\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:15.2\(5e\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:16.0\(1g\):*:*:*:*:*:*:*
- cpe:2.3:o:cisco:nx-os:16.0\(1j\):*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-20089
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 21 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-20089
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.4
|
HIGH | CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H |
2.8
|
4.0
|
Cisco Systems, Inc. | |
6.5
|
MEDIUM | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
2.8
|
3.6
|
NIST |
CWE ids for CVE-2023-20089
-
The product does not sufficiently track and release allocated memory after it has been used, which slowly consumes remaining memory.Assigned by: nvd@nist.gov (Primary)
-
The product allocates memory based on an untrusted, large size value, but it does not ensure that the size is within expected limits, allowing arbitrary amounts of memory to be allocated.Assigned by: ykramarz@cisco.com (Secondary)
References for CVE-2023-20089
-
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-aci-lldp-dos-ySCNZOpX
Cisco Nexus 9000 Series Fabric Switches in ACI Mode Link Layer Discovery Protocol Memory Leak Denial of Service VulnerabilityMitigation;Vendor Advisory
Jump to