A vulnerability in the DNS functionality of Cisco Nexus Dashboard Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.
This vulnerability is due to the improper processing of DNS requests. An attacker could exploit this vulnerability by sending a continuous stream of DNS requests to an affected device. A successful exploit could allow the attacker to cause the coredns service to stop working or cause the device to reload, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ndb-dnsdos-bYscZOsu | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2023-02-16T15:24:43.493Z
Updated: 2024-01-25T16:57:31.241Z
Reserved: 2022-10-27T18:47:50.308Z
Link: CVE-2023-20014
JSON object: View
NVD Information
Status : Modified
Published: 2023-03-01T08:15:11.833
Modified: 2024-01-25T17:15:24.883
Link: CVE-2023-20014
JSON object: View
Redhat Information
No data.