Cisco NX-OS Software DHCPv6 Relay Agent DoS (cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn)

high Nessus Plugin ID 206348

Synopsis

The remote device is missing a vendor-supplied security patch

Description

A vulnerability in the DHCPv6 relay agent of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific fields in a DHCPv6 RELAY-REPLY message. An attacker could exploit this vulnerability by sending a crafted DHCPv6 packet to any IPv6 address that is configured on an affected device. A successful exploit could allow the attacker to cause the dhcp_snoop process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvz72834, CSCwk27906

See Also

http://www.nessus.org/u?cb4d94f6

http://www.nessus.org/u?0fd3f483

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvz72834

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCwk27906

Plugin Details

Severity: High

ID: 206348

File Name: cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn.nasl

Version: 1.1

Type: combined

Family: CISCO

Published: 8/30/2024

Updated: 8/30/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.2

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2024-20446

CVSS v3

Risk Factor: High

Base Score: 8.6

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:nx-os

Required KB Items: Host/Cisco/NX-OS/Version, Host/Cisco/NX-OS/Model, Host/Cisco/NX-OS/Device

Exploit Ease: No known exploits are available

Patch Publication Date: 8/28/2024

Vulnerability Publication Date: 8/28/2024

Reference Information

CVE: CVE-2024-20446

CWE: 476

CISCO-SA: cisco-sa-nxos-dhcp6-relay-dos-znEAA6xn

IAVA: 2024-A-0529

CISCO-BUG-ID: CSCvz72834, CSCwk27906