8.6
CVE-2021-1587
- EPSS 0.35%
- Veröffentlicht 25.08.2021 20:15:11
- Zuletzt bearbeitet 21.11.2024 05:44:41
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
A vulnerability in the VXLAN Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software, known as NGOAM, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific packets with a Transparent Interconnection of Lots of Links (TRILL) OAM EtherType. An attacker could exploit this vulnerability by sending crafted packets, including the TRILL OAM EtherType of 0x8902, to a device that is part of a VXLAN Ethernet VPN (EVPN) fabric. A successful exploit could allow the attacker to cause an affected device to experience high CPU usage and consume excessive system resources, which may result in overall control plane instability and cause the affected device to reload. Note: The NGOAM feature is disabled by default.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Nx-os Version-
Cisco ≫ Nexus 3000 Version-
Cisco ≫ Nexus 3048 Version-
Cisco ≫ Nexus 31108pc-v Version-
Cisco ≫ Nexus 31108tc-v Version-
Cisco ≫ Nexus 31128pq Version-
Cisco ≫ Nexus 3132c-z Version-
Cisco ≫ Nexus 3132q-v Version-
Cisco ≫ Nexus 3132q-x/3132q-xl Version-
Cisco ≫ Nexus 3164q Version-
Cisco ≫ Nexus 3172pq/pq-xl Version-
Cisco ≫ Nexus 3172tq-xl Version-
Cisco ≫ Nexus 3232c Version-
Cisco ≫ Nexus 3264c-e Version-
Cisco ≫ Nexus 3264q Version-
Cisco ≫ Nexus 3408-s Version-
Cisco ≫ Nexus 34180yc Version-
Cisco ≫ Nexus 3432d-s Version-
Cisco ≫ Nexus 3464c Version-
Cisco ≫ Nexus 3524-x/xl Version-
Cisco ≫ Nexus 3548-x/xl Version-
Cisco ≫ Nexus 36180yc-r Version-
Cisco ≫ Nexus 3636c-r Version-
Cisco ≫ Nexus 9000v Version-
Cisco ≫ Nexus 92160yc-x Version-
Cisco ≫ Nexus 92300yc Version-
Cisco ≫ Nexus 92304qc Version-
Cisco ≫ Nexus 92348gc-x Version-
Cisco ≫ Nexus 9236c Version-
Cisco ≫ Nexus 9272q Version-
Cisco ≫ Nexus 93108tc-ex Version-
Cisco ≫ Nexus 93108tc-ex-24 Version-
Cisco ≫ Nexus 93108tc-fx Version-
Cisco ≫ Nexus 93108tc-fx-24 Version-
Cisco ≫ Nexus 93108tc-fx3p Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 9316d-gx Version-
Cisco ≫ Nexus 93180lc-ex Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 93180yc-ex-24 Version-
Cisco ≫ Nexus 93180yc-fx Version-
Cisco ≫ Nexus 93180yc-fx-24 Version-
Cisco ≫ Nexus 93180yc-fx3 Version-
Cisco ≫ Nexus 93180yc-fx3s Version-
Cisco ≫ Nexus 93216tc-fx2 Version-
Cisco ≫ Nexus 93240yc-fx2 Version-
Cisco ≫ Nexus 9332c Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 93360yc-fx2 Version-
Cisco ≫ Nexus 9336c-fx2 Version-
Cisco ≫ Nexus 9336c-fx2-e Version-
Cisco ≫ Nexus 9348gc-fxp Version-
Cisco ≫ Nexus 93600cd-gx Version-
Cisco ≫ Nexus 9364c Version-
Cisco ≫ Nexus 9364c-gx Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372px-e Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9372tx-e Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9508 Version-
Cisco ≫ Nexus 3048 Version-
Cisco ≫ Nexus 31108pc-v Version-
Cisco ≫ Nexus 31108tc-v Version-
Cisco ≫ Nexus 31128pq Version-
Cisco ≫ Nexus 3132c-z Version-
Cisco ≫ Nexus 3132q-v Version-
Cisco ≫ Nexus 3132q-x/3132q-xl Version-
Cisco ≫ Nexus 3164q Version-
Cisco ≫ Nexus 3172pq/pq-xl Version-
Cisco ≫ Nexus 3172tq-xl Version-
Cisco ≫ Nexus 3232c Version-
Cisco ≫ Nexus 3264c-e Version-
Cisco ≫ Nexus 3264q Version-
Cisco ≫ Nexus 3408-s Version-
Cisco ≫ Nexus 34180yc Version-
Cisco ≫ Nexus 3432d-s Version-
Cisco ≫ Nexus 3464c Version-
Cisco ≫ Nexus 3524-x/xl Version-
Cisco ≫ Nexus 3548-x/xl Version-
Cisco ≫ Nexus 36180yc-r Version-
Cisco ≫ Nexus 3636c-r Version-
Cisco ≫ Nexus 9000v Version-
Cisco ≫ Nexus 92160yc-x Version-
Cisco ≫ Nexus 92300yc Version-
Cisco ≫ Nexus 92304qc Version-
Cisco ≫ Nexus 92348gc-x Version-
Cisco ≫ Nexus 9236c Version-
Cisco ≫ Nexus 9272q Version-
Cisco ≫ Nexus 93108tc-ex Version-
Cisco ≫ Nexus 93108tc-ex-24 Version-
Cisco ≫ Nexus 93108tc-fx Version-
Cisco ≫ Nexus 93108tc-fx-24 Version-
Cisco ≫ Nexus 93108tc-fx3p Version-
Cisco ≫ Nexus 93120tx Version-
Cisco ≫ Nexus 93128tx Version-
Cisco ≫ Nexus 9316d-gx Version-
Cisco ≫ Nexus 93180lc-ex Version-
Cisco ≫ Nexus 93180yc-ex Version-
Cisco ≫ Nexus 93180yc-ex-24 Version-
Cisco ≫ Nexus 93180yc-fx Version-
Cisco ≫ Nexus 93180yc-fx-24 Version-
Cisco ≫ Nexus 93180yc-fx3 Version-
Cisco ≫ Nexus 93180yc-fx3s Version-
Cisco ≫ Nexus 93216tc-fx2 Version-
Cisco ≫ Nexus 93240yc-fx2 Version-
Cisco ≫ Nexus 9332c Version-
Cisco ≫ Nexus 9332pq Version-
Cisco ≫ Nexus 93360yc-fx2 Version-
Cisco ≫ Nexus 9336c-fx2 Version-
Cisco ≫ Nexus 9336c-fx2-e Version-
Cisco ≫ Nexus 9348gc-fxp Version-
Cisco ≫ Nexus 93600cd-gx Version-
Cisco ≫ Nexus 9364c Version-
Cisco ≫ Nexus 9364c-gx Version-
Cisco ≫ Nexus 9372px Version-
Cisco ≫ Nexus 9372px-e Version-
Cisco ≫ Nexus 9372tx Version-
Cisco ≫ Nexus 9372tx-e Version-
Cisco ≫ Nexus 9396px Version-
Cisco ≫ Nexus 9396tx Version-
Cisco ≫ Nexus 9508 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Typ | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.35% | 0.543 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
nvd@nist.gov | 4.3 | 8.6 | 2.9 |
AV:N/AC:M/Au:N/C:N/I:N/A:P
|
psirt@cisco.com | 8.6 | 3.9 | 4 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
|
CWE-115 Misinterpretation of Input
The product misinterprets an input, whether from an attacker or another product, in a security-relevant fashion.
CWE-436 Interpretation Conflict
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.