{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-19T08:47:58.067","vulnerabilities":[{"cve":{"id":"CVE-2023-20169","sourceIdentifier":"psirt@cisco.com","published":"2023-08-23T19:15:07.893","lastModified":"2024-11-21T07:40:44.107","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco NX-OS Software for the Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload.\r\n\r This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the unexpected restart of the IS-IS process, which could cause the affected device to reload. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2 adjacent to the affected device."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":7.4,"baseSeverity":"HIGH","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":2.8,"impactScore":4.0}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-788"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-20"}]}],"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:nx-os:10.3\\(2\\):*:*:*:*:*:*:*","matchCriteriaId":"8CE0E36D-08A6-48D5-A364-AC066F30F3CB"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*","matchCriteriaId":"FC2A6C31-438A-4CF5-A3F3-364B1672EB7D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*","matchCriteriaId":"4E930332-CDDD-48D5-93BC-C22D693BBFA2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*","matchCriteriaId":"7BF4B8FE-E134-4491-B5C2-C1CFEB64731B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*","matchCriteriaId":"F4226DA0-9371-401C-8247-E6E636A116C3"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*","matchCriteriaId":"7664666F-BCE4-4799-AEEA-3A73E6AD33F4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*","matchCriteriaId":"B3293438-3D18-45A2-B093-2C3F65783336"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*","matchCriteriaId":"8F43B770-D96C-44EA-BC12-9F39FC4317B9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*","matchCriteriaId":"FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*","matchCriteriaId":"CED628B5-97A8-4B26-AA40-BEC854982157"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*","matchCriteriaId":"7BB9DD73-E31D-4921-A6D6-E14E04703588"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*","matchCriteriaId":"4532F513-0543-4960-9877-01F23CA7BA1B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*","matchCriteriaId":"0B43502B-FD53-465A-B60F-6A359C6ACD99"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*","matchCriteriaId":"F3229124-B097-4AAC-8ACD-2F9C89DCC3AB"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*","matchCriteriaId":"1C84D24C-2256-42AF-898A-221EBE9FE1E4"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*","matchCriteriaId":"24FBE87B-8A4F-43A8-98A3-4A7D9C630937"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*","matchCriteriaId":"6ACD09AC-8B28-4ACB-967B-AB3D450BC137"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*","matchCriteriaId":"7D397349-CCC6-479B-9273-FB1FFF4F34F2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*","matchCriteriaId":"DC7286A7-780F-4A45-940A-4AD5C9D0F201"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*","matchCriteriaId":"CA52D5C1-13D8-4D23-B022-954CCEF491F1"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*","matchCriteriaId":"5F7AF8D7-431B-43CE-840F-CC0817D159C0"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*","matchCriteriaId":"DAC204C8-1A5A-4E85-824E-DC9B8F6A802D"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*","matchCriteriaId":"EAF5AF71-15DF-4151-A1CF-E138A7103FC8"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*","matchCriteriaId":"10F80A72-AD54-4699-B8AE-82715F0B58E2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*","matchCriteriaId":"9354B6A2-D7D6-442E-BF4C-FE8A336D9E94"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*","matchCriteriaId":"088C0323-683A-44F5-8D42-FF6EC85D080E"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*","matchCriteriaId":"74CB4002-7636-4382-B33E-FBA060A13C34"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*","matchCriteriaId":"10CEBF73-3EE0-459A-86C5-F8F6243FE27C"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*","matchCriteriaId":"95D2C4C3-65CE-4612-A027-AF70CEFC3233"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*","matchCriteriaId":"83DA8BFA-D7A2-476C-A6F5-CAE610033BC2"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*","matchCriteriaId":"557ED31C-C26A-4FAE-8B14-D06B49F7F08B"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*","matchCriteriaId":"D8D5D5E2-B40B-475D-9EF3-8441016E37E9"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*","matchCriteriaId":"768BE390-5ED5-48A7-9E80-C4DE8BA979B1"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*","matchCriteriaId":"DDC2F709-AFBE-48EA-A3A2-DA1134534FB6"},{"vulnerable":false,"criteria":"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*","matchCriteriaId":"7E02DC82-0D26-436F-BA64-73C958932B0A"}]}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-n3_9k-isis-dos-FTCXB4Vb","source":"psirt@cisco.com","tags":["Vendor Advisory"]},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-n3_9k-isis-dos-FTCXB4Vb","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}