Логотип exploitDog
bind:CVE-2024-20321
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-20321

Количество 3

Количество 3

nvd логотип

CVE-2024-20321

почти 2 года назад

A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the attacker to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-7rpf-cp7m-9q4f

почти 2 года назад

A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the attacker to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2024-01671

почти 2 года назад

Уязвимость реализации протокола внешнего пограничного шлюза (eBGP) операционной системы Cisco NX-OS, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-20321

A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the attacker to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network.

CVSS3: 8.6
1%
Низкий
почти 2 года назад
github логотип
GHSA-7rpf-cp7m-9q4f

A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the attacker to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network.

CVSS3: 8.6
1%
Низкий
почти 2 года назад
fstec логотип
BDU:2024-01671

Уязвимость реализации протокола внешнего пограничного шлюза (eBGP) операционной системы Cisco NX-OS, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 8.6
1%
Низкий
почти 2 года назад

Уязвимостей на страницу