A vulnerability in the anycast gateway feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a device to learn invalid Address Resolution Protocol (ARP) entries. The ARP entries are for nonlocal IP addresses for the subnet. The vulnerability is due to improper validation of a received gratuitous ARP (GARP) request. An attacker could exploit this vulnerability by sending a malicious GARP packet on the local subnet to cause the ARP table on the device to become corrupted. A successful exploit could allow the attacker to populate the ARP table with incorrect entries, which could lead to traffic disruptions.
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact None
Integrity Impact Low
Availability Impact None
User Interaction None
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact None
Integrity Impact Low
Availability Impact None
User Interaction None
Access Vector Adjacent Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact Partial
Availability Impact None
AV:A/AC:L/Au:N/C:N/I:P/A:N
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
AND |
|
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200226-nxos-arp | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2020-02-26T00:00:00
Updated: 2020-02-26T16:50:29
Reserved: 2019-12-12T00:00:00
Link: CVE-2020-3174
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-02-26T17:15:13.563
Modified: 2020-03-03T20:46:38.923
Link: CVE-2020-3174
JSON object: View
Redhat Information
No data.
CWE