Description
A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with administrative privileges or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted Cisco UDLD protocol packets to a directly connected, affected device. A successful exploit could allow the attacker to execute arbitrary code with administrative privileges or cause the Cisco UDLD process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. The attacker needs full control of a directly connected device. That device must be connected over a port channel that has UDLD enabled. To trigger arbitrary code execution, both the UDLD-enabled port channel and specific system conditions must exist. In the absence of either the UDLD-enabled port channel or the system conditions, attempts to exploit this vulnerability will result in a DoS condition. It is possible, but highly unlikely, that an attacker could control the necessary conditions for exploitation. The CVSS score reflects this possibility. However, given the complexity of exploitation, Cisco has assigned a Medium Security Impact Rating (SIR) to this vulnerability.
Published: 2021-02-24
Score: 8.8 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2021-6835 A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with administrative privileges or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted Cisco UDLD protocol packets to a directly connected, affected device. A successful exploit could allow the attacker to execute arbitrary code with administrative privileges or cause the Cisco UDLD process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. The attacker needs full control of a directly connected device. That device must be connected over a port channel that has UDLD enabled. To trigger arbitrary code execution, both the UDLD-enabled port channel and specific system conditions must exist. In the absence of either the UDLD-enabled port channel or the system conditions, attempts to exploit this vulnerability will result in a DoS condition. It is possible, but highly unlikely, that an attacker could control the necessary conditions for exploitation. The CVSS score reflects this possibility. However, given the complexity of exploitation, Cisco has assigned a Medium Security Impact Rating (SIR) to this vulnerability.
History

Sat, 09 Nov 2024 00:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Subscriptions

Cisco Firepower 4110 Firepower 4112 Firepower 4115 Firepower 4120 Firepower 4125 Firepower 4140 Firepower 4145 Firepower 4150 Firepower 9300 Firepower Extensible Operating System Mds 9148s Mds 9250i Mds 9706 Mds 9710 Nexus 3048 Nexus 31108pv-v Nexus 31108tc-v Nexus 31128pq Nexus 3132c-z Nexus 3132q-v Nexus 3132q-x Nexus 3132q-xl Nexus 3164q Nexus 3172pq Nexus 3172pq-xl Nexus 3232c Nexus 3264c-e Nexus 3264q Nexus 3408-s Nexus 34180yc Nexus 3432d-s Nexus 3464c Nexus 3524-x Nexus 3524-xl Nexus 3548-x Nexus 3548-xl Nexus 36180yc-r Nexus 3636c-r Nexus 5548p Nexus 5548up Nexus 5596t Nexus 5596up Nexus 56128p Nexus 5624q Nexus 5648q Nexus 5672up Nexus 5672up-16g Nexus 5696q Nexus 6001 Nexus 6004 Nexus 7000 Nexus 7700 Nexus 9000v Nexus 92160yc-x Nexus 9221c Nexus 92300yc Nexus 92304qc Nexus 92348gc-x Nexus 9236c Nexus 9272q Nexus 93108tc-ex Nexus 93108tc-ex-24 Nexus 93108tc-fx Nexus 93108tc-fx-24 Nexus 93120tx Nexus 93128tx Nexus 9316d-gx Nexus 93180lc-ex Nexus 93180yc-ex Nexus 93180yc-ex-24 Nexus 93180yc-fx Nexus 93180yc-fx-24 Nexus 93180yc-fx3 Nexus 93180yc-fx3s Nexus 93216tc-fx2 Nexus 93240yc-fx2 Nexus 9332pq Nexus 93360yc-fx2 Nexus 9336c-fx2 Nexus 9336c-fx2-e Nexus 9336pq Nexus 9348gc-fxp Nexus 93600cd-gx Nexus 9364c Nexus 9364c-gx Nexus 9372px Nexus 9372px-e Nexus 9372tx Nexus 9372tx-e Nexus 9396px Nexus 9396tx Nexus 9508 Nx-os Ucs 6248up Ucs 6296up Ucs 6324 Ucs 6332 Ucs 6332-16up Ucs 64108 Ucs 6454 Unified Computing System
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-08T23:37:56.190Z

Reserved: 2020-11-13T00:00:00.000Z

Link: CVE-2021-1368

cve-icon Vulnrichment

Updated: 2024-08-03T16:11:16.857Z

cve-icon NVD

Status : Modified

Published: 2021-02-24T20:15:13.473

Modified: 2024-11-21T05:44:11.723

Link: CVE-2021-1368

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses