← Back to CVEs
CVE-2021-34696
MEDIUM5.8
Description
A vulnerability in the access control list (ACL) programming of Cisco ASR 900 and ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incorrect programming of hardware when an ACL is configured using a method other than the configuration CLI. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
CVE Details
CVSS v3.1 Score5.8
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published9/23/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
cisco:asr_902cisco:asr_903cisco:asr_907cisco:asr_920-10sz-pdcisco:asr_920-10sz-pd_rcisco:asr_920-12cz-acisco:asr_920-12cz-a_rcisco:asr_920-12cz-dcisco:asr_920-12cz-d_rcisco:asr_920-12sz-imcisco:asr_920-12sz-im_rcisco:asr_920-24sz-imcisco:asr_920-24sz-im_rcisco:asr_920-24sz-mcisco:asr_920-24sz-m_rcisco:asr_920-24tz-mcisco:asr_920-24tz-m_rcisco:asr_920-4sz-acisco:asr_920-4sz-a_rcisco:asr_920-4sz-dcisco:asr_920-4sz-d_rcisco:asr_920u-12sz-imcisco:ios_xe
Weaknesses (CWE)
CWE-284
References
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr900acl-UeEyCxkv(psirt@cisco.com)
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr900acl-UeEyCxkv(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.