CVE-2023-20089 (CNNVD-202302-1931)
中文标题:
Cisco Nexus 9000 Series Fabric Switches 安全漏洞
英文标题:
Cisco Nexus 9000 Series Fabric Switches in ACI Mode Link Layer Discovery Protocol Memory Leak Denial of Service Vulnerability
漏洞描述
中文描述:
Cisco Nexus 9000 Series Fabric Switches是美国思科(Cisco)公司的一款9000系列光纤交换机。 Cisco Nexus 9000 Series Fabric Switches存在安全漏洞。攻击者利用该漏洞造成内存泄漏,从而导致设备意外重新加载。
英文描述:
A vulnerability in the Link Layer Discovery Protocol (LLDP) feature for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated, adjacent attacker to cause a memory leak, which could result in an unexpected reload of the device. This vulnerability is due to incorrect error checking when parsing ingress LLDP packets. An attacker could exploit this vulnerability by sending a steady stream of crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause a memory leak, which could result in a denial of service (DoS) condition when the device unexpectedly reloads. Note: This vulnerability cannot be exploited by transit traffic through the device. The crafted LLDP packet must be targeted to a directly connected interface, and the attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). In addition, the attack surface for this vulnerability can be reduced by disabling LLDP on interfaces where it is not required.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco NX-OS System Software in ACI Mode | n/a | - | - |
cpe:2.3:a:cisco:cisco_nx-os_system_software_in_aci_mode_:n_a:*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(1g\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(1g\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(2e\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(2e\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(2f\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(2f\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(2g\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(2g\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(2h\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(2h\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(3e\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(3e\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(3f\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(3f\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(3g\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(3g\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(4d\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(4d\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(4e\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(4e\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(4f\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(4f\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(5c\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(5c\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(5d\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(5d\):*:*:*:*:*:*:*
|
| cisco | nx-os | 15.2\(5e\) | - | - |
cpe:2.3:o:cisco:nx-os:15.2\(5e\):*:*:*:*:*:*:*
|
| cisco | nx-os | 16.0\(1g\) | - | - |
cpe:2.3:o:cisco:nx-os:16.0\(1g\):*:*:*:*:*:*:*
|
| cisco | nx-os | 16.0\(1j\) | - | - |
cpe:2.3:o:cisco:nx-os:16.0\(1j\):*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2023-20089 |
2025-11-11 15:21:47 | 2025-11-11 07:38:02 |
| NVD | nvd_CVE-2023-20089 |
2025-11-11 14:58:56 | 2025-11-11 07:46:12 |
| CNNVD | cnnvd_CNNVD-202302-1931 |
2025-11-11 15:11:08 | 2025-11-11 07:57:48 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 其他
- cnnvd_id: 未提取 -> CNNVD-202302-1931
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 17
- data_sources: ['cve'] -> ['cve', 'nvd']