Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2021-1389


A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A successful exploit could allow the attacker to access resources that would typically be protected by the interface ACL.


Published

2021-02-04T17:15:18.937

Last Modified

2024-11-21T05:44:14.533

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 5.8 (MEDIUM)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:P/A:N

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: PARTIAL
  • Integrity Impact: PARTIAL
  • Availability Impact: NONE
Exploitability Score

10.0

Impact Score

4.9

Weaknesses
  • Type: Secondary
    CWE-284
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco ios_xr < 6.6.3 Yes
Operating System cisco ios_xr 7.1.0 Yes
Operating System cisco ios_xr 7.2.0 Yes
Hardware cisco ncs_540 - No
Hardware cisco ncs_5501 - No
Hardware cisco ncs_5501-se - No
Hardware cisco ncs_5502 - No
Hardware cisco ncs_5502-se - No
Hardware cisco ncs_5508 - No
Hardware cisco ncs_5516 - No
Hardware cisco ncs_560 - No
Operating System cisco nx-os - Yes
Hardware cisco nexus_3600 - No
Hardware cisco nexus_9500_r - No

References