TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2021-1586

HIGH
8.6

Beschreibung

A vulnerability in the Multi-Pod or Multi-Site network configurations for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to unexpectedly restart the device, resulting in a denial of service (DoS) condition. This vulnerability exists because TCP traffic sent to a specific port on an affected device is not properly sanitized. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port that is listening on a public-facing IP address for the Multi-Pod or Multi-Site configuration. A successful exploit could allow the attacker to cause the device to restart unexpectedly, resulting in a DoS condition.

CVE Details

CVSS v3.1 Bewertung8.6
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht8/25/2021
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0

Betroffene Produkte

cisco:nexus_9000vcisco:nexus_92160yc-xcisco:nexus_92300yccisco:nexus_92304qccisco:nexus_92348gc-xcisco:nexus_9236ccisco:nexus_9272qcisco:nexus_93108tc-excisco:nexus_93108tc-ex-24cisco:nexus_93108tc-fxcisco:nexus_93108tc-fx-24cisco:nexus_93108tc-fx3pcisco:nexus_93120txcisco:nexus_93128txcisco:nexus_9316d-gxcisco:nexus_93180lc-excisco:nexus_93180yc-excisco:nexus_93180yc-ex-24cisco:nexus_93180yc-fxcisco:nexus_93180yc-fx-24cisco:nexus_93180yc-fx3cisco:nexus_93180yc-fx3scisco:nexus_93216tc-fx2cisco:nexus_93240yc-fx2cisco:nexus_9332ccisco:nexus_9332pqcisco:nexus_93360yc-fx2cisco:nexus_9336c-fx2cisco:nexus_9336c-fx2-ecisco:nexus_9348gc-fxpcisco:nexus_93600cd-gxcisco:nexus_9364ccisco:nexus_9364c-gxcisco:nexus_9372pxcisco:nexus_9372px-ecisco:nexus_9372txcisco:nexus_9372tx-ecisco:nexus_9396pxcisco:nexus_9396txcisco:nexus_9508cisco:nx-os

Schwachen (CWE)

CWE-345CWE-345

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.