4.3
CVE-2021-1367
- EPSS 0.22%
- Published 24.02.2021 20:15:13
- Last modified 21.11.2024 05:44:11
- Source psirt@cisco.com
- Teams watchlist Login
- Open Login
A vulnerability in the Protocol Independent Multicast (PIM) feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted PIM packet to an affected device. A successful exploit could allow the attacker to cause a traffic loop, resulting in a DoS condition.
Data is provided by the National Vulnerability Database (NVD)
Cisco ≫ Nx-os Version9.3(5)
Cisco ≫ Nexus 9000v Switch Version-
Cisco ≫ Nexus 92160yc-x Switch Version-
Cisco ≫ Nexus 92300yc Switch Version-
Cisco ≫ Nexus 92304qc Switch Version-
Cisco ≫ Nexus 92348gc-x Switch Version-
Cisco ≫ Nexus 9236c Switch Version-
Cisco ≫ Nexus 9272q Switch Version-
Cisco ≫ Nexus 93108tc-ex-24 Switch Version-
Cisco ≫ Nexus 93108tc-ex Switch Version-
Cisco ≫ Nexus 93108tc-fx-24 Version-
Cisco ≫ Nexus 93108tc-fx Switch Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 9316d-gx Version-
Cisco ≫ Nexus 93180lc-ex Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 93180yc-ex-24 Version-
Cisco ≫ Nexus 93180yc-fx Version-
Cisco ≫ Nexus 93180yc-fx-24 Version-
Cisco ≫ Nexus 93180yc-fx3 Version-
Cisco ≫ Nexus 93180yc-fx3s Version-
Cisco ≫ Nexus 93216tc-fx2 Version-
Cisco ≫ Nexus 93240yc-fx2 Version-
Cisco ≫ Nexus 9332c Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 93360yc-fx2 Version-
Cisco ≫ Nexus 9336c-fx2 Version-
Cisco ≫ Nexus 9336c-fx2-e Version-
Cisco ≫ Nexus 9336pq Version-
Cisco ≫ Nexus 9348gc-fxp Version-
Cisco ≫ Nexus 93600cd-gx Version-
Cisco ≫ Nexus 9364c Version-
Cisco ≫ Nexus 9364c-gx Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372px-e Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9372tx-e Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9504 Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Cisco ≫ Nexus 92160yc-x Switch Version-
Cisco ≫ Nexus 92300yc Switch Version-
Cisco ≫ Nexus 92304qc Switch Version-
Cisco ≫ Nexus 92348gc-x Switch Version-
Cisco ≫ Nexus 9236c Switch Version-
Cisco ≫ Nexus 9272q Switch Version-
Cisco ≫ Nexus 93108tc-ex-24 Switch Version-
Cisco ≫ Nexus 93108tc-ex Switch Version-
Cisco ≫ Nexus 93108tc-fx-24 Version-
Cisco ≫ Nexus 93108tc-fx Switch Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 9316d-gx Version-
Cisco ≫ Nexus 93180lc-ex Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 93180yc-ex-24 Version-
Cisco ≫ Nexus 93180yc-fx Version-
Cisco ≫ Nexus 93180yc-fx-24 Version-
Cisco ≫ Nexus 93180yc-fx3 Version-
Cisco ≫ Nexus 93180yc-fx3s Version-
Cisco ≫ Nexus 93216tc-fx2 Version-
Cisco ≫ Nexus 93240yc-fx2 Version-
Cisco ≫ Nexus 9332c Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 93360yc-fx2 Version-
Cisco ≫ Nexus 9336c-fx2 Version-
Cisco ≫ Nexus 9336c-fx2-e Version-
Cisco ≫ Nexus 9336pq Version-
Cisco ≫ Nexus 9348gc-fxp Version-
Cisco ≫ Nexus 93600cd-gx Version-
Cisco ≫ Nexus 9364c Version-
Cisco ≫ Nexus 9364c-gx Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372px-e Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9372tx-e Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9504 Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 9516 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.22% | 0.417 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
nvd@nist.gov | 2.9 | 5.5 | 2.9 |
AV:A/AC:M/Au:N/C:N/I:N/A:P
|
psirt@cisco.com | 4.3 | 2.8 | 1.4 |
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.