关键漏洞信息 Advisory ID: cisco-sa-20161005-otv CVE ID: CVE-2016-1453 Severity: Critical First Published: 2016 October 5 16:00 GMT Version 1.0: Final Workarounds: Yes Cisco Bug IDs: CSCuy95701 CVSS Score: Base 10.0, Temporal 8.3 Summary Vulnerability: A vulnerability in the Overlay Transport Virtualization (OTV) generic routing encapsulation (GRE) implementation of the Cisco Nexus 7000 and 7700 Series Switches could allow an unauthenticated, adjacent attacker to cause a reload of the affected system or to remotely execute code. Cause: The vulnerability is due to incomplete input validation performed on the size of OTV packet header parameters, which can result in a buffer overflow. Exploitation: An attacker could exploit this vulnerability by sending a crafted OTV UDP packet to the OTV interface on an affected device. An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or cause a reload of the OTV related process on the affected device. Affected Products Vulnerable Products: - Nexus 7000 Series Switches - Nexus 7700 Series Switches Indicators of Compromise Exploitation could cause an affected device to reload and generate an Intermediate System-to-Intermediate System (ISIS) core file. The ISIS core file can be viewed using the command in the NX-OS CLI. Workarounds An Access Control List (ACL) can be configured to drop malformed OTV control packets. Fixed Software Cisco has released free software updates that address the vulnerability described in this advisory.