Vulnerable Products:
At the time of publication, this vulnerability affected Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode, regardless of device configuration.
For information about which Cisco software releases are vulnerable, see the Fixed Software ["#fs"] section of this advisory.Products Confirmed Not Vulnerable:
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following Cisco products:
Firepower 1000 Series Firepower 2100 Series Firepower 4100 Series Firepower 9300 Security Appliances MDS 9000 Series Multilayer Switches Nexus 1000 Virtual Edge for VMware vSphere Nexus 5500 Platform Switches Nexus 5600 Platform Switches Nexus 6000 Series Switches Nexus 7000 Series Switches Nexus 9000 Series Fabric Switches in ACI mode Secure Firewall 3100 Series Secure Firewall 4200 Series UCS 6300 Series Fabric Interconnects UCS 6400 Series Fabric Interconnects UCS 6500 Series Fabric InterconnectsWorkarounds:
There are no workarounds that address this vulnerability.Fixed Software:
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers. Cisco NX-OS Software To help customers...
10.1(1)10.1(2)10.1(2t)10.2(1)10.2(2)10.2(3)10.2(3t)10.2(3v)10.2(4)10.2(5)+97 more10.1(1)10.1(2)10.2(1)10.2(1q)10.2(2)10.2(2a)10.2(3)10.2(4)10.2(5)10.2(6)+88 moreExploitability
AV:LAC:LPR:HUI:NScope
S:UImpact
C:LI:HA:N5.1/CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:N