Cisco has released a patch for an operating system flaw that could leave its Nexus switches open to denial-of-service attacks.
The network equipment maker released the fix Wednesday for NX-OS. The affected switch series are the Nexus 1000v, 5000 and 7000.
To exploit the vulnerability, a hacker could modify an IP packet to trigger a DoS attack, according to the US Computer Emergency Readiness Team. The agency issued an advisory recommending that Nexus users install the patch.
NX-OS is the network operating system within Nexus switches. The vulnerability is within the OS' IP stack and "any feature that makes use of the services offered by the IP stack to parse IP packets is affected," Cisco said.
"Successful exploitation of the vulnerability that is described in this advisory may result in a reload of an affected device," the company said. "Repeated exploitation could result in a sustained DoS condition."
Cisco released last September a set of security patches fixing 10 separate vulnerabilities in some of its major software and unified communications products. Among the fixes was one for a DoS vulnerability in the IOS IP Service Level Agreement feature. The flaw was triggered when specially crafted UDP packets were sent to a vulnerable device, Cisco said.
This article originally appeared at crn.com
Issue: 322 | December 2013
Access CRN's extensive online resources including; email bulletins, community discussions and unique online news.
Processing registration... Please wait.
This process can take up to a minute to complete.
A confirmation email has been sent to your email address - SUPPLIED GOES EMAIL HERE. Please click on the link in the email to verify your email address. You need to verify your email before you can log on to the CRN website or start posting comments on articles.
If you do not receive your confirmation email within the next few minutes, it may be because the email has been captured by a junk mail filter. Please ensure you add the domain '@crn.com.au' to your white-listed senders.