2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-1586" ,
2025-01-26 03:03:52 +00:00
"sourceIdentifier" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"published" : "2021-08-25T20:15:11.237" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T05:44:40.963" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability in the Multi-Pod or Multi-Site network configurations for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to unexpectedly restart the device, resulting in a denial of service (DoS) condition. This vulnerability exists because TCP traffic sent to a specific port on an affected device is not properly sanitized. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port that is listening on a public-facing IP address for the Multi-Pod or Multi-Site configuration. A successful exploit could allow the attacker to cause the device to restart unexpectedly, resulting in a DoS condition."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad en las configuraciones de red Multi-Pod o Multi-Site para Cisco Nexus 9000 Series Fabric Switches en el modo Application Centric Infrastructure (ACI) podr\u00eda permitir a un atacante remoto no autenticado reiniciar inesperadamente el dispositivo, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se presenta porque el tr\u00e1fico TCP enviado a un puerto espec\u00edfico en un dispositivo afectado no se sanea apropiadamente. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de datos TCP dise\u00f1ados a un puerto espec\u00edfico que est\u00e1 escuchando en una direcci\u00f3n IP p\u00fablica para la configuraci\u00f3n de Multi-Pod o Multi-Site. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar que el dispositivo se reinicie inesperadamente, resultando en una condici\u00f3n de DoS."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
2023-11-07 21:03:21 +00:00
} ,
2023-04-24 12:24:31 +02:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
2023-11-07 21:03:21 +00:00
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.6 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 3.9 ,
"impactScore" : 4.0
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 5.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2024-12-08 03:06:42 +00:00
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-345"
}
]
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
"value" : "CWE-345"
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:nx-os:15.0\\(2e\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "11E2E40A-CCD5-4CA7-826E-10923BED72E8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:nx-os:15.1\\(1h\\):*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C78C9E79-C6DC-4FE3-8B79-A9BEBED9A67D"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4283E433-7F8C-4410-B565-471415445811"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F80AB6FB-32FD-43D7-A9F1-80FA47696210"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D5B2E4C1-2627-4B9D-8E92-4B483F647651"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "557ED31C-C26A-4FAE-8B14-D06B49F7F08B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "11411BFD-3F4D-4309-AB35-A3629A360FB0"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E663DE91-C86D-48DC-B771-FA72A8DF7A7C"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A90184B3-C82F-4CE5-B2AD-97D5E4690871"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40E40F42-632A-47DF-BE33-DC25B826310B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BBEF7F26-BB47-44BD-872E-130820557C23"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07DE6F63-2C7D-415B-8C34-01EC05C062F3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F423E45D-A6DD-4305-9C6A-EAB26293E53A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "102F91CD-DFB6-43D4-AE5B-DA157A696230"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E952A96A-0F48-4357-B7DD-1127D8827650"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F70D81F1-8B12-4474-9060-B4934D8A3873"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5394DE31-3863-4CA9-B7B1-E5227183100D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7349D69B-D8FA-4462-AA28-69DD18A652D9"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE4BB834-2C00-4384-A78E-AF3BCDDC58AF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7CE49B45-F2E9-491D-9C29-1B46E9CE14E2"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "91231DC6-2773-4238-8C14-A346F213B5E5"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2DF88547-BAF4-47B0-9F60-80A30297FCEB"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "113772B6-E9D2-4094-9468-3F4E1A87D07D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C45A38D6-BED6-4FEF-AD87-A1E813695DE0"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F1FC2B1F-232E-4754-8076-CC82F3648730"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2CF467E2-4567-426E-8F48-39669E0F514C"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "63842B25-8C32-4988-BBBD-61E9CB09B4F3"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "68EA1FEF-B6B6-49FE-A0A4-5387F76303F8"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4364ADB9-8162-451D-806A-B98924E6B2CF"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B53BCB42-ED61-4FCF-8068-CB467631C63C"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "49E0371B-FDE2-473C-AA59-47E1269D050F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "489D11EC-5A18-4F32-BC7C-AC1FCEC27222"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1BC5293E-F2B4-46DC-85DA-167EA323FCFD"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EA022E77-6557-4A33-9A3A-D028E2DB669A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-tcp-dos-YXukt6gM" ,
2025-01-26 03:03:52 +00:00
"source" : "psirt@cisco.com" ,
2023-04-24 12:24:31 +02:00
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-tcp-dos-YXukt6gM" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}