CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
40.4%
A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic.
This vulnerability is due to an issue with the implementation of the ciphers that are used by the CloudSec encryption feature on affected switches. An attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to read or modify the traffic that is transmitted between the sites.
Cisco has not released and will not release software updates that address this vulnerability.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | nx-os | 14.0(1h) | cpe:2.3:o:cisco:nx-os:14.0\(1h\):*:*:*:*:*:*:* |
cisco | nx-os | 14.0(2c) | cpe:2.3:o:cisco:nx-os:14.0\(2c\):*:*:*:*:*:*:* |
cisco | nx-os | 14.0(3c) | cpe:2.3:o:cisco:nx-os:14.0\(3c\):*:*:*:*:*:*:* |
cisco | nx-os | 14.0(3d) | cpe:2.3:o:cisco:nx-os:14.0\(3d\):*:*:*:*:*:*:* |
cisco | nx-os | 14.1(1i) | cpe:2.3:o:cisco:nx-os:14.1\(1i\):*:*:*:*:*:*:* |
cisco | nx-os | 14.1(1j) | cpe:2.3:o:cisco:nx-os:14.1\(1j\):*:*:*:*:*:*:* |
cisco | nx-os | 14.1(1k) | cpe:2.3:o:cisco:nx-os:14.1\(1k\):*:*:*:*:*:*:* |
cisco | nx-os | 14.1(1l) | cpe:2.3:o:cisco:nx-os:14.1\(1l\):*:*:*:*:*:*:* |
cisco | nx-os | 14.1(2g) | cpe:2.3:o:cisco:nx-os:14.1\(2g\):*:*:*:*:*:*:* |
cisco | nx-os | 14.1(2m) | cpe:2.3:o:cisco:nx-os:14.1\(2m\):*:*:*:*:*:*:* |
[
{
"vendor": "Cisco",
"product": "Cisco NX-OS System Software in ACI Mode",
"versions": [
{
"version": "14.0(1h)",
"status": "affected"
},
{
"version": "14.0(2c)",
"status": "affected"
},
{
"version": "14.0(3d)",
"status": "affected"
},
{
"version": "14.0(3c)",
"status": "affected"
},
{
"version": "14.1(1i)",
"status": "affected"
},
{
"version": "14.1(1j)",
"status": "affected"
},
{
"version": "14.1(1k)",
"status": "affected"
},
{
"version": "14.1(1l)",
"status": "affected"
},
{
"version": "14.1(2g)",
"status": "affected"
},
{
"version": "14.1(2m)",
"status": "affected"
},
{
"version": "14.1(2o)",
"status": "affected"
},
{
"version": "14.1(2s)",
"status": "affected"
},
{
"version": "14.1(2u)",
"status": "affected"
},
{
"version": "14.1(2w)",
"status": "affected"
},
{
"version": "14.1(2x)",
"status": "affected"
},
{
"version": "14.2(1i)",
"status": "affected"
},
{
"version": "14.2(1j)",
"status": "affected"
},
{
"version": "14.2(1l)",
"status": "affected"
},
{
"version": "14.2(2e)",
"status": "affected"
},
{
"version": "14.2(2f)",
"status": "affected"
},
{
"version": "14.2(2g)",
"status": "affected"
},
{
"version": "14.2(3j)",
"status": "affected"
},
{
"version": "14.2(3l)",
"status": "affected"
},
{
"version": "14.2(3n)",
"status": "affected"
},
{
"version": "14.2(3q)",
"status": "affected"
},
{
"version": "14.2(4i)",
"status": "affected"
},
{
"version": "14.2(4k)",
"status": "affected"
},
{
"version": "14.2(4o)",
"status": "affected"
},
{
"version": "14.2(4p)",
"status": "affected"
},
{
"version": "14.2(5k)",
"status": "affected"
},
{
"version": "14.2(5l)",
"status": "affected"
},
{
"version": "14.2(5n)",
"status": "affected"
},
{
"version": "14.2(6d)",
"status": "affected"
},
{
"version": "14.2(6g)",
"status": "affected"
},
{
"version": "14.2(6h)",
"status": "affected"
},
{
"version": "14.2(6l)",
"status": "affected"
},
{
"version": "14.2(7f)",
"status": "affected"
},
{
"version": "14.2(7l)",
"status": "affected"
},
{
"version": "14.2(6o)",
"status": "affected"
},
{
"version": "14.2(7q)",
"status": "affected"
},
{
"version": "14.2(7r)",
"status": "affected"
},
{
"version": "14.2(7s)",
"status": "affected"
},
{
"version": "14.2(7t)",
"status": "affected"
},
{
"version": "14.2(7u)",
"status": "affected"
},
{
"version": "14.2(7v)",
"status": "affected"
},
{
"version": "14.2(7w)",
"status": "affected"
},
{
"version": "15.0(1k)",
"status": "affected"
},
{
"version": "15.0(1l)",
"status": "affected"
},
{
"version": "15.0(2e)",
"status": "affected"
},
{
"version": "15.0(2h)",
"status": "affected"
},
{
"version": "15.1(1h)",
"status": "affected"
},
{
"version": "15.1(2e)",
"status": "affected"
},
{
"version": "15.1(3e)",
"status": "affected"
},
{
"version": "15.1(4c)",
"status": "affected"
},
{
"version": "15.2(1g)",
"status": "affected"
},
{
"version": "15.2(2e)",
"status": "affected"
},
{
"version": "15.2(2f)",
"status": "affected"
},
{
"version": "15.2(2g)",
"status": "affected"
},
{
"version": "15.2(2h)",
"status": "affected"
},
{
"version": "15.2(3e)",
"status": "affected"
},
{
"version": "15.2(3f)",
"status": "affected"
},
{
"version": "15.2(3g)",
"status": "affected"
},
{
"version": "15.2(4d)",
"status": "affected"
},
{
"version": "15.2(4e)",
"status": "affected"
},
{
"version": "15.2(5c)",
"status": "affected"
},
{
"version": "15.2(5d)",
"status": "affected"
},
{
"version": "15.2(5e)",
"status": "affected"
},
{
"version": "15.2(4f)",
"status": "affected"
},
{
"version": "15.2(6e)",
"status": "affected"
},
{
"version": "15.2(6g)",
"status": "affected"
},
{
"version": "15.2(7f)",
"status": "affected"
},
{
"version": "15.2(7g)",
"status": "affected"
},
{
"version": "15.2(8d)",
"status": "affected"
},
{
"version": "15.2(8e)",
"status": "affected"
},
{
"version": "15.2(8f)",
"status": "affected"
},
{
"version": "15.2(8g)",
"status": "affected"
},
{
"version": "15.2(8h)",
"status": "affected"
},
{
"version": "16.0(1g)",
"status": "affected"
},
{
"version": "16.0(1j)",
"status": "affected"
},
{
"version": "16.0(2h)",
"status": "affected"
},
{
"version": "16.0(2j)",
"status": "affected"
},
{
"version": "16.0(3d)",
"status": "affected"
},
{
"version": "16.0(3e)",
"status": "affected"
},
{
"version": "15.3(1d)",
"status": "affected"
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N
AI Score
Confidence
High
EPSS
Percentile
40.4%