Lucene search

K
ciscoCiscoCISCO-SA-20140806-CVE-2014-3330
HistoryAug 06, 2014 - 6:54 p.m.

Cisco Nexus 9000 Series Switches Access List Bypass Vulnerability

2014-08-0618:54:22
tools.cisco.com
9

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.004

Percentile

73.2%

A vulnerability in the implementation of the access list logging feature of Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote attacker to bypass the access list restriction for the logged traffic.

The vulnerability is due to insufficient policy checks for the logged packets. An attacker could exploit this vulnerability by sending a flood of denied packets that match an access list entry with the log keyword. An exploit could allow the attacker to bypass the access control list for a small percentage of the packets, which would otherwise have been dropped.

Cisco has confirmed the vulnerability in a security notice and released software updates.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
cisconx_osMatch6.1\(2\)i2
OR
cisconx_osMatch6.1\(2\)i2\(1\)

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

EPSS

0.004

Percentile

73.2%

Related for CISCO-SA-20140806-CVE-2014-3330