Vulnslist

find the latest Cisco vulnerabilities

Cisco NX-OS Software Unexpected IP in IP Packet Processing Vulnerability

cisco-sa-nxos-ipip-dos-kCT9X4 · High · Published · Updated

A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to bypass certain security boundaries or cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the affected device unexpectedly decapsulating and processing IP in IP packets that are destined to a locally configured IP address. An attacker could exploit this vulnerability by sending a crafted IP in IP packet to an affected device. A successful exploit could cause the affected device to unexpectedly decapsulate the IP in IP packet and forward the inner IP packet. This may result in IP packets bypassing input access control lists (ACLs) configured on the affected device or other security boundaries defined elsewhere in the network. Under certain conditions, an exploit could cause the network stack process to crash and restart multiple times, leading to a reload of the affected device and a DoS condition. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ipip-dos-kCT9X4

Workarounds

Using infrastructure access control lists (iACLs) to allow only strictly required management and control plane traffic that is destined to the affected device, as recommended in the Cisco Guide to Securing NX-OS Software Devices https://sec.cloudapps.cisco.com/security/center/resources/securing_nx_os.html , would prevent exploitation of this issue on Nexus devices. Customers may also consider explicitly denying all IP packets with protocol number 4 (corresponding to IP in IP packets) as part of their iACLs, if no legitimate IP in IP traffic is used in their network. A customized control plane policing (CoPP) policy may also be used to drop IP in IP traffic that is destined to an affected device; however, support for CoPP customization varies across different Nexus platforms and software releases. Customers are advised to contact their support organization for any assistance required with evaluating the feasibility of a workaround and with implementing a workaround on an affected device.

Exploitation of this issue on Cisco UCS Fabric Interconnects is only possible if NetFlow monitoring is enabled on an affected device. Customers who do not have a strict requirement of using NetFlow monitoring may evaluate the possibility of disabling it until they can perform a software upgrade to a fixed release.

Customers should first evaluate the impact of configuration changes to the device and their security policy. Customers concerned about undesired or unexpected side effects should consult with their support organization before implementing any configuration change.

CVEsCVE-2020-10136
Cisco Bug IDsCSCvt67740, CSCvu03158, CSCvt66624, CSCun53663, CSCvt67739, CSCvt67738, CSCvu10050
CVSS ScoreBase 8.6
Base 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco Unified Computing System (Managed), Cisco NX-OS Software 7.3(0)D1(1), Cisco NX-OS Software 7.3(0)DX(1), Cisco NX-OS Software 7.3(0)N1(1), Cisco NX-OS Software 7.3(0)N1(1b), Cisco NX-OS Software 7.3(0)N1(1a), Cisco NX-OS Software 7.3(1)D1(1), Cisco NX-OS Software 7.3(1)N1(1), Cisco NX-OS Software 7.3(2)D1(1), Cisco NX-OS Software 7.3(2)D1(2), Cisco NX-OS Software 7.3(2)D1(3), Cisco NX-OS Software 7.3(2)D1(3a), Cisco NX-OS Software 7.3(2)D1(1d), Cisco NX-OS Software 7.3(2)N1(1), Cisco NX-OS Software 7.3(2)N1(1b), Cisco NX-OS Software 7.3(2)N1(1c), Cisco NX-OS Software 7.3(3)N1(1), Cisco NX-OS Software 7.3(4)N1(1), Cisco NX-OS Software 7.3(4)N1(1a), Cisco NX-OS Software 7.3(3)D1(1), Cisco NX-OS Software 7.3(4)D1(1), Cisco NX-OS Software 7.3(5)N1(1), Cisco NX-OS Software 7.3(6)N1(1), Cisco NX-OS Software 7.3(6)N1(1a), Cisco NX-OS Software 7.3(5)D1(1), Cisco NX-OS Software 7.3(7)N1(1), Cisco NX-OS Software 7.3(7)N1(1a), Cisco NX-OS Software 7.3(6)D1(1), Cisco NX-OS Software, Cisco Nexus 7000 Series Switches, Cisco Nexus 5000 Series Switches, Cisco Nexus 6000 Series Switches

Related Products

Product CVE Evidence
Cisco RV Series Routers CVE-2020-10136 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2020-10136 Cisco OpenVuln
Cisco Unified Computing System (Managed) CVE-2020-10136 Cisco OpenVuln
Cisco Nexus 7000 Series Switches CVE-2020-10136 Cisco OpenVuln
Cisco Nexus 6000 Series Switches CVE-2020-10136 Cisco OpenVuln
Cisco Nexus 5000 Series Switches CVE-2020-10136 Cisco OpenVuln
Cisco NX-OS Software CVE-2020-10136 Cisco OpenVuln