CVE-2021-34696

A vulnerability in the access control list (ACL) programming of Cisco ASR 900 and ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incorrect programming of hardware when an ACL is configured using a method other than the configuration CLI. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-10sz-pd:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-10sz-pd_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12cz-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12cz-a_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12cz-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12cz-d_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12sz-im:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12sz-im_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24sz-im:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24sz-im_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24sz-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24sz-m_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24tz-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24tz-m_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-4sz-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-4sz-a_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-4sz-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-4sz-d_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920u-12sz-im:-:*:*:*:*:*:*:*

History

05 Oct 2021, 17:48

Type Values Removed Values Added
CWE NVD-CWE-Other
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.8
References (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr900acl-UeEyCxkv - (CISCO) https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr900acl-UeEyCxkv - Vendor Advisory
CPE cpe:2.3:h:cisco:asr_920-4sz-d_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12cz-d_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-4sz-a_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24tz-m_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12sz-im_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24sz-m_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-10sz-pd:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24sz-im_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24sz-im:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920u-12sz-im:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12sz-im:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24tz-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12cz-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12cz-a_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-10sz-pd_r:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-12cz-d:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-24sz-m:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-4sz-a:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_920-4sz-d:-:*:*:*:*:*:*:*

23 Sep 2021, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-09-23 03:15

Updated : 2023-12-10 14:09


NVD link : CVE-2021-34696

Mitre link : CVE-2021-34696

CVE.ORG link : CVE-2021-34696


JSON object : View

Products Affected

cisco

  • asr_920-10sz-pd
  • ios_xe
  • asr_920-24sz-im
  • asr_920-24sz-m_r
  • asr_920-12cz-a_r
  • asr_920-4sz-a
  • asr_920-12cz-d_r
  • asr_920-4sz-a_r
  • asr_920-24tz-m_r
  • asr_920-12cz-d
  • asr_920u-12sz-im
  • asr_920-12sz-im
  • asr_902
  • asr_920-10sz-pd_r
  • asr_903
  • asr_920-24sz-im_r
  • asr_920-4sz-d
  • asr_920-12sz-im_r
  • asr_920-24tz-m
  • asr_920-4sz-d_r
  • asr_920-12cz-a
  • asr_920-24sz-m
  • asr_907
CWE
NVD-CWE-Other CWE-284

Improper Access Control