A vulnerability in Security Group Tag Exchange Protocol (SXP) in Cisco IOS Software, Cisco IOS XE Software, and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
The vulnerability exists because crafted SXP packets are mishandled. An attacker could exploit this vulnerability by sending specifically crafted SXP packets to the affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sxp-68TEVzR”]
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | ios | 15.3t | cpe:2.3:o:cisco:ios:15.3t:*:*:*:*:*:*:* |
cisco | ios | 15.1sy | cpe:2.3:o:cisco:ios:15.1sy:*:*:*:*:*:*:* |
cisco | ios | 15.4t | cpe:2.3:o:cisco:ios:15.4t:*:*:*:*:*:*:* |
cisco | ios | 15.2e | cpe:2.3:o:cisco:ios:15.2e:*:*:*:*:*:*:* |
cisco | ios | 15.3m | cpe:2.3:o:cisco:ios:15.3m:*:*:*:*:*:*:* |
cisco | ios | 15.2ey | cpe:2.3:o:cisco:ios:15.2ey:*:*:*:*:*:*:* |
cisco | ios | 15.2sy | cpe:2.3:o:cisco:ios:15.2sy:*:*:*:*:*:*:* |
cisco | ios | 15.4m | cpe:2.3:o:cisco:ios:15.4m:*:*:*:*:*:*:* |
cisco | ios | 15.3xb | cpe:2.3:o:cisco:ios:15.3xb:*:*:*:*:*:*:* |
cisco | ios | 15.4cg | cpe:2.3:o:cisco:ios:15.4cg:*:*:*:*:*:*:* |