A vulnerability in the access control list (ACL) programming of Cisco ASR 900 and ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incorrect programming of hardware when an ACL is configured using a method other than the configuration CLI. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr900acl-UeEyCxkv | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Information
Published : 2021-09-22 20:15
Updated : 2021-10-05 10:48
NVD link : CVE-2021-34696
Mitre link : CVE-2021-34696
JSON object : View
CWE
Products Affected
cisco
- asr_920-4sz-a
- asr_920-12cz-a
- asr_920-24sz-m_r
- asr_920-4sz-d
- asr_920-12sz-im
- asr_920-12sz-im_r
- ios_xe
- asr_920u-12sz-im
- asr_920-24sz-im_r
- asr_920-10sz-pd
- asr_920-4sz-a_r
- asr_920-12cz-d_r
- asr_920-4sz-d_r
- asr_907
- asr_920-24tz-m
- asr_920-24tz-m_r
- asr_902
- asr_903
- asr_920-12cz-d
- asr_920-24sz-im
- asr_920-10sz-pd_r
- asr_920-24sz-m
- asr_920-12cz-a_r