A vulnerability in the Multi-Pod or Multi-Site network configurations for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to unexpectedly restart the device, resulting in a denial of service (DoS) condition. This vulnerability exists because TCP traffic sent to a specific port on an affected device is not properly sanitized. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port that is listening on a public-facing IP address for the Multi-Pod or Multi-Site configuration. A successful exploit could allow the attacker to cause the device to restart unexpectedly, resulting in a DoS condition.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Cisco
Subscribe
|
Nexus 9000v
Subscribe
Nexus 92160yc-x
Subscribe
Nexus 92300yc
Subscribe
Nexus 92304qc
Subscribe
Nexus 92348gc-x
Subscribe
Nexus 9236c
Subscribe
Nexus 9272q
Subscribe
Nexus 93108tc-ex
Subscribe
Nexus 93108tc-ex-24
Subscribe
Nexus 93108tc-fx
Subscribe
Nexus 93108tc-fx-24
Subscribe
Nexus 93108tc-fx3p
Subscribe
Nexus 93120tx
Subscribe
Nexus 93128tx
Subscribe
Nexus 9316d-gx
Subscribe
Nexus 93180lc-ex
Subscribe
Nexus 93180yc-ex
Subscribe
Nexus 93180yc-ex-24
Subscribe
Nexus 93180yc-fx
Subscribe
Nexus 93180yc-fx-24
Subscribe
Nexus 93180yc-fx3
Subscribe
Nexus 93180yc-fx3s
Subscribe
Nexus 93216tc-fx2
Subscribe
Nexus 93240yc-fx2
Subscribe
Nexus 9332c
Subscribe
Nexus 9332pq
Subscribe
Nexus 93360yc-fx2
Subscribe
Nexus 9336c-fx2
Subscribe
Nexus 9336c-fx2-e
Subscribe
Nexus 9348gc-fxp
Subscribe
Nexus 93600cd-gx
Subscribe
Nexus 9364c
Subscribe
Nexus 9364c-gx
Subscribe
Nexus 9372px
Subscribe
Nexus 9372px-e
Subscribe
Nexus 9372tx
Subscribe
Nexus 9372tx-e
Subscribe
Nexus 9396px
Subscribe
Nexus 9396tx
Subscribe
Nexus 9508
Subscribe
Nx-os
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-7053 | A vulnerability in the Multi-Pod or Multi-Site network configurations for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to unexpectedly restart the device, resulting in a denial of service (DoS) condition. This vulnerability exists because TCP traffic sent to a specific port on an affected device is not properly sanitized. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port that is listening on a public-facing IP address for the Multi-Pod or Multi-Site configuration. A successful exploit could allow the attacker to cause the device to restart unexpectedly, resulting in a DoS condition. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 07 Nov 2024 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-11-07T22:02:32.217Z
Reserved: 2020-11-13T00:00:00
Link: CVE-2021-1586
Updated: 2024-08-03T16:18:10.396Z
Status : Modified
Published: 2021-08-25T20:15:11.237
Modified: 2024-11-21T05:44:40.963
Link: CVE-2021-1586
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD