Vulnslist

find the latest Cisco vulnerabilities

Cisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod and Multi-Site TCP Denial of Service Vulnerability

cisco-sa-n9kaci-tcp-dos-YXukt6gM · High · Published · Updated

February 23, 2022 Update: After further investigation, Cisco determined that an additional fix was necessary to completely address this vulnerability. The initial fix allowed an attacker to cause high CPU utilization on an affected device, which could impact user traffic. See the Fixed Software section of this advisory for updated information about the fixed releases. A vulnerability in the Multi-Pod or Multi-Site network configurations for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to unexpectedly restart the device, resulting in a denial of service (DoS) condition. This vulnerability exists because TCP traffic sent to a specific port on an affected device is not properly sanitized. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port that is listening on a public-facing IP address for the Multi-Pod or Multi-Site configuration. A successful exploit could allow the attacker to cause the device to restart unexpectedly, resulting in a DoS condition.  Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-n9kaci-tcp-dos-YXukt6gM This advisory is part of the August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: August 2021 Cisco FXOS and NX-OS Software Security Advisory Bundled Publication.

Workarounds

There are no workarounds that address this vulnerability.

Note: The Cisco Nexus 9000 Series Fabric Switches ACI Mode Multi-Pod and Multi-Site network configuration should follow the Cisco ACI Multi-Site Architecture - Deployment best practices https://www.cisco.com/c/en/us/solutions/collateral/data-center-virtualization/application-centric-infrastructure/white-paper-c11-739609.html#Deploymentbestpractices recommendations, which include access control lists (ACLs) to only permit required and trusted network traffic to and from the device. Please also see Cisco Guide to Securing NX-OS Software Devices https://sec.cloudapps.cisco.com/security/center/resources/securing_nx_os.html for further information.

CVEsCVE-2021-1586
Cisco Bug IDsCSCvw87983, CSCvz75847
CVSS ScoreBase 8.6
Base 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco NX-OS System Software in ACI Mode 13.2(1l), Cisco NX-OS System Software in ACI Mode 13.2(1m), Cisco NX-OS System Software in ACI Mode 13.2(2l), Cisco NX-OS System Software in ACI Mode 13.2(2o), Cisco NX-OS System Software in ACI Mode 13.2(3i), Cisco NX-OS System Software in ACI Mode 13.2(3n), Cisco NX-OS System Software in ACI Mode 13.2(3o), Cisco NX-OS System Software in ACI Mode 13.2(3r), Cisco NX-OS System Software in ACI Mode 13.2(4d), Cisco NX-OS System Software in ACI Mode 13.2(4e), Cisco NX-OS System Software in ACI Mode 13.2(3j), Cisco NX-OS System Software in ACI Mode 13.2(3s), Cisco NX-OS System Software in ACI Mode 13.2(5d), Cisco NX-OS System Software in ACI Mode 13.2(5e), Cisco NX-OS System Software in ACI Mode 13.2(5f), Cisco NX-OS System Software in ACI Mode 13.2(6i), Cisco NX-OS System Software in ACI Mode 13.2(41d), Cisco NX-OS System Software in ACI Mode 13.2(7f), Cisco NX-OS System Software in ACI Mode 13.2(7k), Cisco NX-OS System Software in ACI Mode 13.2(9b), Cisco NX-OS System Software in ACI Mode 13.2(8d), Cisco NX-OS System Software in ACI Mode 13.2(9f), Cisco NX-OS System Software in ACI Mode 13.2(9h), Cisco NX-OS System Software in ACI Mode 13.2(10e), Cisco NX-OS System Software in ACI Mode 13.2(10f), Cisco NX-OS System Software in ACI Mode 13.2(10g), Cisco NX-OS System Software in ACI Mode 14.0(1h), Cisco NX-OS System Software in ACI Mode 14.0(2c), Cisco NX-OS System Software in ACI Mode 14.0(3d), Cisco NX-OS System Software in ACI Mode 14.0(3c), Cisco NX-OS System Software in ACI Mode 14.1(1i), Cisco NX-OS System Software in ACI Mode 14.1(1j), Cisco NX-OS System Software in ACI Mode 14.1(1k), Cisco NX-OS System Software in ACI Mode 14.1(1l), Cisco NX-OS System Software in ACI Mode 14.1(2g), Cisco NX-OS System Software in ACI Mode 14.1(2m), Cisco NX-OS System Software in ACI Mode 14.1(2o), Cisco NX-OS System Software in ACI Mode 14.1(2s), Cisco NX-OS System Software in ACI Mode 14.1(2u), Cisco NX-OS System Software in ACI Mode 14.1(2w), Cisco NX-OS System Software in ACI Mode 14.1(2x), Cisco NX-OS System Software in ACI Mode 14.2(1i), Cisco NX-OS System Software in ACI Mode 14.2(1j), Cisco NX-OS System Software in ACI Mode 14.2(1l), Cisco NX-OS System Software in ACI Mode 14.2(2e), Cisco NX-OS System Software in ACI Mode 14.2(2f), Cisco NX-OS System Software in ACI Mode 14.2(2g), Cisco NX-OS System Software in ACI Mode 14.2(3j), Cisco NX-OS System Software in ACI Mode 14.2(3l), Cisco NX-OS System Software in ACI Mode 14.2(3n), Cisco NX-OS System Software in ACI Mode 14.2(3q), Cisco NX-OS System Software in ACI Mode 14.2(4i), Cisco NX-OS System Software in ACI Mode 14.2(4k), Cisco NX-OS System Software in ACI Mode 14.2(4o), Cisco NX-OS System Software in ACI Mode 14.2(4p), Cisco NX-OS System Software in ACI Mode 14.2(5k), Cisco NX-OS System Software in ACI Mode 14.2(5l), Cisco NX-OS System Software in ACI Mode 14.2(5n), Cisco NX-OS System Software in ACI Mode 14.2(6d), Cisco NX-OS System Software in ACI Mode 14.2(6g), Cisco NX-OS System Software in ACI Mode 14.2(6h), Cisco NX-OS System Software in ACI Mode 14.2(6l), Cisco NX-OS System Software in ACI Mode 14.2(7f), Cisco NX-OS System Software in ACI Mode 14.2(7l), Cisco NX-OS System Software in ACI Mode 14.2(6o), Cisco NX-OS System Software in ACI Mode 14.2(7q), Cisco NX-OS System Software in ACI Mode 14.2(7r), Cisco NX-OS System Software in ACI Mode 15.0(1k), Cisco NX-OS System Software in ACI Mode 15.0(1l), Cisco NX-OS System Software in ACI Mode 15.0(2e), Cisco NX-OS System Software in ACI Mode 15.0(2h), Cisco NX-OS System Software in ACI Mode 15.1(2e), Cisco NX-OS System Software in ACI Mode 15.1(3e), Cisco NX-OS System Software in ACI Mode 15.1(4c), Cisco NX-OS System Software in ACI Mode 15.2(1g), Cisco NX-OS System Software in ACI Mode 15.2(2e), Cisco NX-OS System Software in ACI Mode 15.2(2f), Cisco NX-OS System Software in ACI Mode 15.2(2g), Cisco NX-OS System Software in ACI Mode 15.2(2h), Cisco NX-OS System Software in ACI Mode 15.2(3e), Cisco NX-OS System Software in ACI Mode 15.2(3f), Cisco NX-OS System Software in ACI Mode 15.2(3g), Cisco NX-OS System Software in ACI Mode, Cisco Nexus 9000 Series Switches

Related Products

Product CVE Evidence
Cisco RV Series Routers CVE-2021-1586 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2021-1586 Cisco OpenVuln
Cisco NX-OS Software CVE-2021-1586 Cisco OpenVuln
Cisco Firepower Extensible Operating System (FXOS) CVE-2021-1586 Cisco OpenVuln
Cisco Catalyst PON Series Switches CVE-2021-1586 Cisco OpenVuln
Cisco Nexus 9000 Series Switches CVE-2021-1586 Cisco OpenVuln
Cisco NX-OS System Software in ACI Mode CVE-2021-1586 Cisco OpenVuln