Cisco Bug: CSCvi81675 - Evaluation of N9k/N7k/N5k/N3k/MDS for NTP March 2018
Aug 06, 2018
- Cisco Nexus 9000 Series Switches
Known Affected Releases
Symptom: Cisco NX-OS System Software includes a version of Network Time Protocol that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2018-7170, CVE-2018-7185, CVE-2016-1549, CVE-2017-6458, CVE-2016-7434, CVE-2017-6463, CVE-2017-6462, CVE-2015-1798, CVE-2017-6460, CVE-2015-7850, CVE-2017-6464, CVE-2016-9042, CVE-2017-6451, CVE-2015-7704, CVE-2015-8138, CVE-2016-1547, CVE-2016-1548, CVE-2016-1550, CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518, CVE-2016-2519, CVE-2016-7431, CVE-2015-7703, CVE-2015-7701, CVE-2015-7705, CVE-2015-7855, CVE-2015-7853, CVE-2015-7854, CVE-2015-7848, CVE-2016-7426, CVE-2016-7429, CVE-2014-9297, CVE-2013-5211, CVE-2014-9298, CVE-2014-9296, CVE-2016-9312, CVE-2014-9295, CVE-2014-9294, CVE-2014-9293, CVE-2015-3405, CVE-2016-9310, CVE-2016-9311, CVE-2016-4953, CVE-2016-4954, CVE-2016-4955, CVE-2016-4956, CVE-2016-4957 This bug was opened to address the potential impact on this product. Conditions: Device with default configuration.
Bug details contain sensitive information and therefore require a Cisco.com account to be viewed.
Bug Details Include
- Full Description (including symptoms, conditions and workarounds)
- Known Fixed Releases
- Related Community Discussions
- Number of Related Support Cases