Cisco NX-OS Software Pong Packet Denial of Service Vulnerability
This vulnerability affects the following products when running Cisco NX-OS Software Release 7.2(1)D(1), 7.2(2)D1(1), or 7.2(2)D1(2) with both the Pong and FabricPath features enabled and the FabricPath port is actively monitored via a SPAN session:
- Cisco Nexus 7000 Series Switches
- Cisco Nexus 7700 Series Switches
To determine whether a device is running a vulnerable release of Cisco NX-OS Software, administrators can use the
show versioncommand in the NX-OS command-line interface (CLI).
The following example shows the output of the
show versioncommand for a Cisco Nexus 7000 Series Switch running Cisco NX-OS Software Release 7.2(2)D1(2):
Nexus# show version
Cisco Nexus Operating System (NX-OS) Software
TAC support: http://ift.tt/xtpRjv
Documents: http://ift.tt/2ERH0MZ
Copyright (c) 2002-2016, Cisco Systems, Inc. All rights reserved.
The copyrights to certain works contained in this software are
owned by other third parties and used and distributed under
license. Certain components of this software are licensed under
the GNU General Public License (GPL) version 2.0 or the GNU
Lesser General Public License (LGPL) Version 2.1. A copy of each
such license is available at
http://ift.tt/1blpKjs and
http://ift.tt/1blpKjt
Software
BIOS: version 2.12.0
kickstart: version 7.2(2)D1(2)
system: version 7.2(2)D1(2)
.
.
.
To determine whether a device has the Pong tool enabled, administrators can use the
show running-config | include "feature pong"command in the NX-OS CLI. The following example shows the output of this command for a Cisco Nexus 7000 Series Switch that has the Pong tool enabled (if this command returns empty output the Pong tool is not enabled):
Nexus# show running-config | include "feature pong"
feature pong
To determine whether a device has the FabricPath feature enabled, administrators can use the
show running-config | include "feature-set fabricpath"command in the NX-OS CLI. The following example shows the output of this command for a Cisco Nexus 7000 Series Switch that has the FabricPath feature enabled (if this command returns empty output, the FabricPath feature is not enabled):
Nexus# show running-config | include "feature-set fabricpath"
feature-set fabricpath
To determine whether a device has a SPAN session configured, administrators can use the
show running-config monitorcommand in NX-OS CLI. The following example shows the output of this command for a Cisco Nexus 7000 Series Switch that has a SPAN session monitoring interface Ethernet 1/10 configured and enabled (if this command returns empty output, no SPAN session is configured):
Nexus# show running-config monitor
!Command: show running-config monitor
!Time: Mon Oct 9 12:04:52 2017
version 7.2(2)D1(2)
monitor session 1
source interface Ethernet1/10 both
destination interface Ethernet1/12
no shut
No other Cisco products are currently known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect Cisco NX-OS Software Releases 7.2(0)D1(1) and earlier.
Cisco has confirmed that this vulnerability does not affect Cisco Multilayer Director Switches as the affected NX-OS releases are not available for this platform.
from Cisco Security Advisory http://ift.tt/2FKXTKu