2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2021-1621" ,
"sourceIdentifier" : "ykramarz@cisco.com" ,
"published" : "2021-09-23T03:15:13.210" ,
2024-12-08 03:06:42 +00:00
"lastModified" : "2024-11-21T05:44:45.667" ,
2023-11-07 21:03:21 +00:00
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "A vulnerability in the Layer 2 punt code of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a queue wedge on an interface that receives specific Layer 2 frames, resulting in a denial of service (DoS) condition. This vulnerability is due to improper handling of certain Layer 2 frames. An attacker could exploit this vulnerability by sending specific Layer 2 frames on the segment the router is connected to. A successful exploit could allow the attacker to cause a queue wedge on the interface, resulting in a DoS condition."
} ,
{
"lang" : "es" ,
"value" : "Una vulnerabilidad en el c\u00f3digo de punt de Capa 2 de Cisco IOS XE Software podr\u00eda permitir a un atacante adyacente y no autenticado causar una queue wedge en una interfaz que reciba tramas espec\u00edficas de Capa 2, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad es debido al manejo inapropiado de determinadas tramas de capa 2. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de tramas espec\u00edficas de capa 2 en el segmento al que est\u00e1 conectado el router. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante causar una queue wedge en la interfaz, resultando en una condici\u00f3n de DoS"
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
2024-12-08 03:06:42 +00:00
"source" : "ykramarz@cisco.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.4 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 4.0
2023-11-07 21:03:21 +00:00
} ,
2023-04-24 12:24:31 +02:00
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"cvssData" : {
2023-11-07 21:03:21 +00:00
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.4 ,
"baseSeverity" : "HIGH" ,
2023-04-24 12:24:31 +02:00
"attackVector" : "ADJACENT_NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2023-04-24 12:24:31 +02:00
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 4.0
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:A/AC:L/Au:N/C:N/I:N/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 3.3 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "ADJACENT_NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "LOW" ,
"exploitabilityScore" : 6.5 ,
"impactScore" : 2.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
2024-12-08 03:06:42 +00:00
"source" : "ykramarz@cisco.com" ,
"type" : "Secondary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "CWE-399"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
2024-12-08 03:06:42 +00:00
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
2023-04-24 12:24:31 +02:00
"description" : [
{
"lang" : "en" ,
2024-12-08 03:06:42 +00:00
"value" : "NVD-CWE-noinfo"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "17.3.1" ,
"matchCriteriaId" : "100403F0-0796-4993-A2AF-6A14EDC84478"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F4856E07-B3C2-4674-9584-866F6AF643B2"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A6F668B9-2C1D-4306-8286-35E67D0F67C7"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1100-4p_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2D2305B-B69E-4F74-A44E-07B3205CE9F7"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5EB8A757-7888-4AC2-BE44-B89DB83C6C77"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B80890A8-E3D3-462C-B125-9E9BC6525B02"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0547E196-5991-4C33-823A-342542E9DFD3"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D916389F-54DB-44CB-91DD-7CE3C7059350"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "17.3.1" ,
"matchCriteriaId" : "100403F0-0796-4993-A2AF-6A14EDC84478"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "6C8AED7C-DDA3-4C29-BB95-6518C02C551A"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9421DBEF-AE42-4234-B49F-FCC34B804D7F"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5419CB9F-241F-4431-914F-2659BE27BEA5"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5720462A-BE6B-4E84-A1A1-01E80BBA86AD"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "818CEFA6-208C-43C3-8E43-474A93ADCF21"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "82225D40-537F-41D2-B1C4-1B7D06466B06"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : false ,
2023-05-22 20:00:39 +00:00
"criteria" : "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E8B60888-6E2B-494E-AC65-83337661EE7D"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "17.3.1" ,
"matchCriteriaId" : "100403F0-0796-4993-A2AF-6A14EDC84478"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "91209C16-A620-44A0-9134-8AA456343F29"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE2182E7-C813-4966-A36C-E648A9344299"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "ED7C321E-F083-4AB6-96A0-D6358980441E"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7594E307-AC80-41EC-AE94-07E664A7D701"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "33208B25-0CBB-4E31-A892-60B7B5625155"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "09C913FF-63D5-43FB-8B39-598EF436BA5A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E4376E56-A21C-4642-A85D-439C8E21CD7F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CD2794BD-C8CE-46EF-9857-1723FCF04E46"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC03A84F-C8F2-4225-9A00-8FA35368CD57"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "444F688F-79D0-4F22-B530-7BD520080B8F"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "51F2A755-556C-4C5E-8622-96D124319AF7"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "55DD2272-10C2-43B9-9F13-6DC41DBE179B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7428E0A8-1641-47FB-9CA9-34311DEF660D"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DE7401B7-094C-46EB-9869-2F0372E8B26B"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "854D9594-FE84-4E7B-BA21-A3287F2DC302"
} ,
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C81CC6E3-B989-4730-820E-46734E3E608D"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "17.3.1" ,
"matchCriteriaId" : "100403F0-0796-4993-A2AF-6A14EDC84478"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:csr_1000v:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF8B0B49-2C99-410B-B011-5B821C5992FB"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "17.3.1" ,
"matchCriteriaId" : "100403F0-0796-4993-A2AF-6A14EDC84478"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:h:cisco:isrv:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DA48CFE9-2791-40D2-9F33-763C97F7D988"
}
]
}
]
}
] ,
"references" : [
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-quewedge-69BsHUBW" ,
"source" : "ykramarz@cisco.com" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-quewedge-69BsHUBW" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}