![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.103818 |
Category: | CISCO |
Title: | Cisco NX-OS Software BGP Regex Vulnerability (Cisco-SA-20130917-CVE-2013-1121) |
Summary: | A vulnerability in the Border Gateway Protocol (BGP) code of; Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device; to reload. |
Description: | Summary: A vulnerability in the Border Gateway Protocol (BGP) code of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the affected device to reload. Vulnerability Insight: The vulnerability is due to an issue with the regex engine used when processing complex regular expressions. An attacker could exploit this vulnerability by injecting specific autonomous system (AS) path sets. If the affected device has a complex regular expression applied to the inbound routes, the vulnerability may be triggered. Vulnerability Impact: An exploit could allow the attacker to trigger Cisco NX-OS Software to restart. Affected Software/OS: Cisco Nexus 7000 Series running on NX-OS. Solution: See the referenced vendor advisory for a solution. CVSS Score: 5.4 CVSS Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2013-1121 Cisco Security Advisory: 20130917 Cisco NX-OS Software BGP Regex Vulnerability http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2013-1121 |
Copyright | Copyright (C) 2013 Greenbone Networks GmbH |
This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |