Описание
The implementation of the OSPF protocol in VMware NSX-V Edge 6.2.x prior to 6.2.8 and NSX-V Edge 6.3.x prior to 6.3.3 doesn't correctly handle the link-state advertisement (LSA). A rogue LSA may exploit this issue resulting in continuous sending of LSAs between two routers eventually going in loop or loss of connectivity.
Ссылки
- Third Party AdvisoryVDB Entry
- Vendor Advisory
- Third Party AdvisoryVDB Entry
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия от 6.2.0 (включая) до 6.2.8 (исключая)Версия от 6.3.0 (включая) до 6.3.3 (исключая)
Одно из
cpe:2.3:a:vmware:nsx-v_edge:*:*:*:*:*:*:*:*
cpe:2.3:a:vmware:nsx-v_edge:*:*:*:*:*:*:*:*
EPSS
Процентиль: 52%
0.0029
Низкий
5.9 Medium
CVSS3
7.1 High
CVSS2
Дефекты
CWE-400
Связанные уязвимости
CVSS3: 5.9
github
больше 3 лет назад
The implementation of the OSPF protocol in VMware NSX-V Edge 6.2.x prior to 6.2.8 and NSX-V Edge 6.3.x prior to 6.3.3 doesn't correctly handle the link-state advertisement (LSA). A rogue LSA may exploit this issue resulting in continuous sending of LSAs between two routers eventually going in loop or loss of connectivity.
EPSS
Процентиль: 52%
0.0029
Низкий
5.9 Medium
CVSS3
7.1 High
CVSS2
Дефекты
CWE-400