Lucene search

K
ciscoCiscoCISCO-SA-NXOS-PO-ACL-TKYEPGVL
HistoryFeb 28, 2024 - 4:00 p.m.

Cisco Nexus 3000 and 9000 Series Switches Port Channel ACL Programming Vulnerability

2024-02-2816:00:00
tools.cisco.com
10
cisco
nexus
switches
port channel
acl
programming
vulnerability
remote attacker
traffic
configuration changes
hardware programming
network resources
software updates
workarounds
advisory
cisco event response

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device.

This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces.

Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-po-acl-TkyePgvL [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-po-acl-TkyePgvL”]

This advisory is part of the February 2024 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: February 2024 Semiannual Cisco FXOS and NX-OS Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75059”].

Affected configurations

Vulners
Node
cisconx-osMatch9.3nexus_9000_series
OR
cisconx-os_for_nexus_7700_series_switchesMatchany
OR
cisconx-osMatchanynexus_9000_series
OR
cisconx-osMatchanynexus_9000_series
OR
cisconx-osMatch9.3\(10\)nexus_9000_series
OR
cisconx-osMatch9.3\(11\)nexus_9000_series
OR
cisconx-osMatch9.3\(12\)nexus_9000_series
OR
cisconx-os_for_nexus_5500_platform_switchesMatch3000_series_switches
OR
cisconx-os_for_nexus_5500_platform_switchesMatch9000_series_switches
OR
cisconx-osMatchanynexus_9000_series
OR
cisconx-osMatch3000_series_switchesnexus_9000_series
OR
cisconx-osMatch9000_series_switchesnexus_9000_series
OR
cisconx-osMatch3000_series_switchesnexus_9000_series
OR
cisconx-osMatch9000_series_switchesnexus_9000_series
OR
cisconx-osMatch3000_series_switchesnexus_9000_series
OR
cisconx-osMatch9000_series_switchesnexus_9000_series

7.2 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.1%

Related for CISCO-SA-NXOS-PO-ACL-TKYEPGVL