CVE-2021-1389

A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A successful exploit could allow the attacker to access resources that would typically be protected by the interface ACL.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.1.0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_560:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_9500_r:-:*:*:*:*:*:*:*

History

20 Sep 2022, 17:03

Type Values Removed Values Added
CWE CWE-284 NVD-CWE-Other

08 Feb 2021, 20:18

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.4
v3 : 6.5
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv6-acl-CHgdYk8j - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipv6-acl-CHgdYk8j - Vendor Advisory
CPE cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.1.0:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_9500_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_560:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*

04 Feb 2021, 19:15

Type Values Removed Values Added
Summary A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A successful exploit could allow the attacker to access resources that would typically be protected by the interface ACL. A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A successful exploit could allow the attacker to access resources that would typically be protected by the interface ACL.

04 Feb 2021, 18:27

Type Values Removed Values Added
New CVE

Information

Published : 2021-02-04 17:15

Updated : 2023-12-10 13:41


NVD link : CVE-2021-1389

Mitre link : CVE-2021-1389

CVE.ORG link : CVE-2021-1389


JSON object : View

Products Affected

cisco

  • nexus_3600
  • nexus_9500_r
  • ios_xr
  • ncs_5502
  • ncs_5508
  • ncs_5502-se
  • ncs_560
  • ncs_5501
  • ncs_5516
  • nx-os
  • ncs_5501-se
  • ncs_540
CWE
NVD-CWE-Other CWE-284

Improper Access Control