A vulnerability in the Multi-Pod or Multi-Site network configurations for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to unexpectedly restart the device, resulting in a denial of service (DoS) condition. This vulnerability exists because TCP traffic sent to a specific port on an affected device is not properly sanitized. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port that is listening on a public-facing IP address for the Multi-Pod or Multi-Site configuration. A successful exploit could allow the attacker to cause the device to restart unexpectedly, resulting in a DoS condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-tcp-dos-YXukt6gM | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-08-25 13:15
Updated : 2021-09-02 10:18
NVD link : CVE-2021-1586
Mitre link : CVE-2021-1586
JSON object : View
CWE
CWE-345
Insufficient Verification of Data Authenticity
Products Affected
cisco
- nexus_9372tx-e
- nexus_9236c
- nexus_9372px
- nexus_9396tx
- nexus_93108tc-ex
- nexus_9336c-fx2
- nexus_93240yc-fx2
- nexus_93108tc-fx
- nexus_93180yc-fx3s
- nexus_93180yc-fx-24
- nexus_92348gc-x
- nexus_93120tx
- nexus_93216tc-fx2
- nexus_9372px-e
- nexus_93180lc-ex
- nexus_93108tc-ex-24
- nexus_93108tc-fx-24
- nexus_93360yc-fx2
- nexus_93180yc-ex
- nexus_93180yc-fx3
- nexus_9336c-fx2-e
- nexus_92160yc-x
- nexus_93600cd-gx
- nexus_9364c
- nexus_92300yc
- nexus_9272q
- nexus_93128tx
- nexus_9372tx
- nexus_93180yc-fx
- nexus_9332c
- nexus_93180yc-ex-24
- nx-os
- nexus_9316d-gx
- nexus_9332pq
- nexus_9396px
- nexus_93108tc-fx3p
- nexus_9000v
- nexus_92304qc
- nexus_9348gc-fxp
- nexus_9508
- nexus_9364c-gx