Lucene search

K
ciscoCiscoCISCO-SA-20170315-CNS
HistoryMar 15, 2017 - 4:00 p.m.

Cisco Nexus 7000 Series Switches Access-Control Filtering Mechanisms Bypass Vulnerability

2017-03-1516:00:00
tools.cisco.com
20

0.001 Low

EPSS

Percentile

51.2%

A vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system.

The vulnerability is due to the device failing to inspect specific traffic when other ACL checking mechanisms are in place. An attacker could exploit this vulnerability by issuing crafted commands for which a particular ACL would not match defined traffic. An exploit could allow the attacker to bypass certain rulesets defined on a Network Time Protocol (NTP) ACL.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns”]

Affected configurations

Vulners
Node
cisconx-osMatch5.2nexus_9000_series
OR
cisconx-osMatch6.1nexus_9000_series
OR
cisconx-osMatch7.2\(1\)d1nexus_9000_series
OR
cisconx-osMatch7.3\(1\)n1nexus_9000_series
OR
cisconx-osMatch5.2\(4\)nexus_9000_series
OR
cisconx-osMatch6.1\(3\)s5nexus_9000_series
OR
cisconx-osMatch6.1\(3\)s6nexus_9000_series
OR
cisconx-osMatch7.2\(1\)d1\(1\)nexus_9000_series
OR
cisconx-osMatch7.3\(1\)n1\(0.1\)nexus_9000_series

0.001 Low

EPSS

Percentile

51.2%

Related for CISCO-SA-20170315-CNS