A vulnerability in Intermediate System-to-Intermediate System (IS-IS) protocol packet processing of Cisco Nexus 5000, 6000, and 7000 Series Switches software could allow an unauthenticated, adjacent attacker to cause a reload of the affected device. Switches in the FabricPath domain crash because of an __inst_001__isis_fabricpath hap reset when processing a crafted link-state packet. More Information: CSCvc45002. Known Affected Releases: 7.1(3)N1(2.1) 7.1(3)N1(3.12) 7.3(2)N1(0.296) 8.0(1)S2. Known Fixed Releases: 6.2(18)S11 7.0(3)I5(1.170) 7.0(3)I5(2) 7.1(4)N1(0.4) 7.1(4)N1(1b) 7.1(5)N1(0.986) 7.1(5)N1(1) 7.2(3)D1(0.8) 7.3(2)N1(0.304) 7.3(2)N1(1) 8.0(0.96)S0 8.0(1) 8.0(1)E1 8.0(1)S4 8.3(0)CV(0.788).
2017-01-26T07:59:00.623
2025-04-20T01:37:25.860
Deferred
CVSSv3.0: 6.1 (MEDIUM)
AV:A/AC:M/Au:N/C:N/I:N/A:C
5.5
6.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Operating System | cisco | nx-os | 7.1\(3\)n1\(2.1\) | Yes |
Operating System | cisco | nx-os | 7.1\(3\)n1\(3.12\) | Yes |
Operating System | cisco | nx-os | 7.3\(2\)n1\(0.296\) | Yes |
Operating System | cisco | nx-os | 8.0\(1\)s2 | Yes |
Hardware | cisco | nexus_5000 | - | No |
Hardware | cisco | nexus_6001 | - | No |
Hardware | cisco | nexus_6004 | - | No |
Hardware | cisco | nexus_7000 | - | No |