CVE-2017-4920
low-risk
Published 2017-12-05
The implementation of the OSPF protocol in VMware NSX-V Edge 6.2.x prior to 6.2.8 and NSX-V Edge 6.3.x prior to 6.3.3 doesn't correctly handle the link-state advertisement (LSA). A rogue LSA may exploit this issue resulting in continuous sending of LSAs between two routers eventually going in loop or loss of connectivity.
Do I need to act?
-
0.29% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
5
CVSS 5.9/10
Medium
NETWORK
/ HIGH complexity
Affected Products (1)
Nsx-V Edge
Affected Vendors
References (4)
Third Party Advisory
http://www.securityfocus.com/bid/100277
Vendor Advisory
https://www.vmware.com/security/advisories/VMSA-2017-0014.html
Third Party Advisory
http://www.securityfocus.com/bid/100277
Vendor Advisory
https://www.vmware.com/security/advisories/VMSA-2017-0014.html
24
/ 100
low-risk
Severity
18/34 · Moderate
Exploitability
1/34 · Minimal
Exposure
5/34 · Minimal