Vulnslist

find the latest Cisco vulnerabilities

Cisco NX-OS Software VXLAN OAM (NGOAM) Denial of Service Vulnerability

cisco-sa-nxos-ngoam-dos-LTDb9Hv · High · Published · Updated

A vulnerability in the VXLAN Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software, known as NGOAM, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific packets with a Transparent Interconnection of Lots of Links (TRILL) OAM EtherType. An attacker could exploit this vulnerability by sending crafted packets, including the TRILL OAM EtherType of 0x8902, to a device that is part of a VXLAN Ethernet VPN (EVPN) fabric. A successful exploit could allow the attacker to cause an affected device to experience high CPU usage and consume excessive system resources, which may result in overall control plane instability and cause the affected device to reload. Note: The NGOAM feature is disabled by default. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-ngoam-dos-LTDb9Hv This advisory is part of the August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Workarounds

There are no workarounds that address this vulnerability.

However, disabling the NGOAM feature removes the exploit vector. Administrators can disable the NGOAM feature by using the no feature ngoam command at the Cisco NX-OS CLI in global configuration mode. This action may be a suitable mitigation for affected devices that do not require use of this feature until they can be upgraded.

While this mitigation has been deployed and was proven successful in a test environment, customers should determine the applicability and effectiveness in their own environment and under their own use conditions. Customers should be aware that any mitigation that is implemented may negatively impact the functionality or performance of their network based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any mitigations before first evaluating the applicability to their own environment and any impact to such environment.

CVEsCVE-2021-1587
Cisco Bug IDsCSCvx66917
CVSS ScoreBase 8.6
Base 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco NX-OS Software 9.2(1), Cisco NX-OS Software 9.2(2), Cisco NX-OS Software 9.2(2t), Cisco NX-OS Software 9.2(3), Cisco NX-OS Software 9.2(3y), Cisco NX-OS Software 9.2(4), Cisco NX-OS Software 9.2(2v), Cisco NX-OS Software 9.3(1), Cisco NX-OS Software 9.3(2), Cisco NX-OS Software 9.3(3), Cisco NX-OS Software 9.3(1z), Cisco NX-OS Software 9.3(4), Cisco NX-OS Software 9.3(5), Cisco NX-OS Software 9.3(6), Cisco NX-OS Software 9.3(5w), Cisco NX-OS Software 9.3(7), Cisco NX-OS Software 9.3(7k), Cisco NX-OS Software 9.3(7a), Cisco NX-OS Software 10.1(1), Cisco NX-OS Software, Cisco Nexus 3000 Series Switches, Cisco Nexus 9000 Series Switches

CSAF Product Statuses

Product Status Source CVE Rows
Cisco NX-OS Software 10.1(1) when installed on Cisco Nexus 3000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 10.1(1) when installed on Cisco Nexus 9000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(1) when installed on Cisco Nexus 3000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(1) when installed on Cisco Nexus 9000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(2) when installed on Cisco Nexus 3000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(2) when installed on Cisco Nexus 9000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(2t) when installed on Cisco Nexus 3000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(2v) when installed on Cisco Nexus 3000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(3) when installed on Cisco Nexus 3000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(3) when installed on Cisco Nexus 9000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(3y) when installed on Cisco Nexus 3000 Series Switches known_affected cisco_csaf CVE-2021-1587 1
Cisco NX-OS Software 9.2(3y) when installed on Cisco Nexus 9000 Series Switches known_affected cisco_csaf CVE-2021-1587 1

Showing 12 of 35 CSAF status groups; 23 more not shown.

Related Products

Product CVE Evidence
Cisco NX-OS Software CVE-2021-1587 Cisco OpenVuln
Cisco Nexus 9000 Series Switches CVE-2021-1587 Cisco OpenVuln · family-level
Cisco Nexus 3000 Series Switches CVE-2021-1587 Cisco OpenVuln · family-level