CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
57.9%
A vulnerability in the Precision Time Protocol (PTP) feature of Cisco Nexus 5500, 5600, and 6000 Series Switches running Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of protection against PTP frame flood attacks. An attacker could exploit this vulnerability by sending large streams of malicious IPv4 or IPv6 PTP traffic to the affected device. A successful exploit could allow the attacker to cause a DoS condition, impacting the traffic passing through the device.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | nx-os | 7.3(2)n1(0.8) | cpe:2.3:o:cisco:nx-os:7.3\(2\)n1\(0.8\):*:*:*:*:*:*:* |
cisco | nexus_5548p | - | cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:* |
cisco | nexus_5548up | - | cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:* |
cisco | nexus_5596t | - | cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:* |
cisco | nexus_5596up | - | cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:* |
cisco | nexus_56128p | - | cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:* |
cisco | nexus_5624q | - | cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:* |
cisco | nexus_5648q | - | cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:* |
cisco | nexus_5672up | - | cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:* |
cisco | nexus_5672up-16g | - | cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:* |
CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
57.9%