A vulnerability within the Endpoint Learning feature of Cisco Nexus 9000 Series Switches running in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an endpoint device in certain circumstances. The vulnerability is due to improper endpoint learning when packets are received on a specific port from outside the ACI fabric and destined to an endpoint located on a border leaf when Disable Remote Endpoint Learning has been enabled. This can result in a Remote (XR) entry being created for the impacted endpoint that will become stale if the endpoint migrates to a different port or leaf switch. This results in traffic not reaching the impacted endpoint until the Remote entry can be relearned by another mechanism.
History

Thu, 21 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2019-08-29T21:50:14.241461Z

Updated: 2024-11-21T19:15:02.726Z

Reserved: 2018-12-06T00:00:00

Link: CVE-2019-1977

cve-icon Vulnrichment

Updated: 2024-08-04T18:35:51.847Z

cve-icon NVD

Status : Modified

Published: 2019-08-30T09:15:20.553

Modified: 2024-11-21T04:37:48.753

Link: CVE-2019-1977

cve-icon Redhat

No data.