Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2021-1231 (GCVE-0-2021-1231)
Vulnerability from cvelistv5 – Published: 2021-02-24 19:30 – Updated: 2024-11-08 23:38| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Cisco | Cisco NX-OS System Software in ACI Mode |
Affected:
n/a
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T16:02:56.339Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20210224 Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2021-1231",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T20:48:27.423914Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-11-08T23:38:56.652Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco NX-OS System Software in ACI Mode",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2021-02-24T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic."
}
],
"exploits": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-284",
"description": "CWE-284",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-02-24T19:30:36.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "20210224 Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability",
"tags": [
"vendor-advisory",
"x_refsource_CISCO"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj"
}
],
"source": {
"advisory": "cisco-sa-apic-lldap-dos-WerV9CFj",
"defect": [
[
"CSCvu84570"
]
],
"discovery": "INTERNAL"
},
"title": "Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability",
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-02-24T16:00:00",
"ID": "CVE-2021-1231",
"STATE": "PUBLIC",
"TITLE": "Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco NX-OS System Software in ACI Mode",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic."
}
]
},
"exploit": [
{
"lang": "en",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."
}
],
"impact": {
"cvss": {
"baseScore": "4.7",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210224 Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj"
}
]
},
"source": {
"advisory": "cisco-sa-apic-lldap-dos-WerV9CFj",
"defect": [
[
"CSCvu84570"
]
],
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2021-1231",
"datePublished": "2021-02-24T19:30:36.992Z",
"dateReserved": "2020-11-13T00:00:00.000Z",
"dateUpdated": "2024-11-08T23:38:56.652Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj\", \"name\": \"20210224 Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-03T16:02:56.339Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2021-1231\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-08T20:48:27.423914Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-08T21:01:10.418Z\"}}], \"cna\": {\"title\": \"Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability\", \"source\": {\"defect\": [[\"CSCvu84570\"]], \"advisory\": \"cisco-sa-apic-lldap-dos-WerV9CFj\", \"discovery\": \"INTERNAL\"}, \"metrics\": [{\"cvssV3_1\": {\"scope\": \"CHANGED\", \"version\": \"3.1\", \"baseScore\": 4.7, \"attackVector\": \"ADJACENT_NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L\", \"integrityImpact\": \"NONE\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"LOW\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"NONE\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco NX-OS System Software in ACI Mode\", \"versions\": [{\"status\": \"affected\", \"version\": \"n/a\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"datePublic\": \"2021-02-24T00:00:00.000Z\", \"references\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj\", \"name\": \"20210224 Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability\", \"tags\": [\"vendor-advisory\", \"x_refsource_CISCO\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-284\", \"description\": \"CWE-284\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2021-02-24T19:30:36.000Z\"}, \"x_legacyV4Record\": {\"impact\": {\"cvss\": {\"version\": \"3.0\", \"baseScore\": \"4.7\", \"vectorString\": \"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L\"}}, \"source\": {\"defect\": [[\"CSCvu84570\"]], \"advisory\": \"cisco-sa-apic-lldap-dos-WerV9CFj\", \"discovery\": \"INTERNAL\"}, \"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"n/a\"}]}, \"product_name\": \"Cisco NX-OS System Software in ACI Mode\"}]}, \"vendor_name\": \"Cisco\"}]}}, \"exploit\": [{\"lang\": \"en\", \"value\": \"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.\"}], \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj\", \"name\": \"20210224 Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability\", \"refsource\": \"CISCO\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-284\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2021-1231\", \"STATE\": \"PUBLIC\", \"TITLE\": \"Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability\", \"ASSIGNER\": \"psirt@cisco.com\", \"DATE_PUBLIC\": \"2021-02-24T16:00:00\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2021-1231\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-11-08T23:38:56.652Z\", \"dateReserved\": \"2020-11-13T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2021-02-24T19:30:36.992Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CVE-2021-1231
Vulnerability from fstec - Published: 24.02.2021{
"CVSS 2.0": "AV:A/AC:L/Au:N/C:N/I:N/A:P",
"CVSS 3.0": "AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "Cisco Systems Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "11.0 (NX-OS), 11.1 (NX-OS), 11.2 (NX-OS), 12.0 (NX-OS), 12.1 (NX-OS), 12.2 (NX-OS), 12.3 (NX-OS), 13.0 (NX-OS), 13.1 (NX-OS), 13.2 (NX-OS), 11.3 (NX-OS), 14.0 (NX-OS), 14.1 (NX-OS), 14.2 (NX-OS), 15.0 (NX-OS)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "24.02.2021",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "02.03.2021",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "02.03.2021",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2021-01054",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2021-1231",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "NX-OS",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": "Cisco Systems Inc. NX-OS 11.0 Cisco Nexus 9000, Cisco Systems Inc. NX-OS 11.1 Nexus 9000 Series, Cisco Systems Inc. NX-OS 11.2 Nexus 9000 Series, Cisco Systems Inc. NX-OS 12.0 Nexus 9000 Series, Cisco Systems Inc. NX-OS 12.1 Nexus 9000 Series, Cisco Systems Inc. NX-OS 12.2 Nexus 9000 Series, Cisco Systems Inc. NX-OS 12.3 Nexus 9000 Series, Cisco Systems Inc. NX-OS 13.0 Nexus 9000 Series, Cisco Systems Inc. NX-OS 13.1 Nexus 9000 Series, Cisco Systems Inc. NX-OS 13.2 Nexus 9000 Series, Cisco Systems Inc. NX-OS 11.3 Nexus 9000 Series, Cisco Systems Inc. NX-OS 14.0 Nexus 9000 Series, Cisco Systems Inc. NX-OS 14.1 Nexus 9000 Series, Cisco Systems Inc. NX-OS 14.2 Nexus 9000 Series, Cisco Systems Inc. NX-OS 15.0 Nexus 9000 Series",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 Link Layer Discovery Protocol (LLDP) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b NX-OS \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 ACI Mode \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 Nexus 9000 Series, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u043f\u0440\u0430\u0432\u0438\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u0434\u043e\u0441\u0442\u0443\u043f\u0430 (CWE-284)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0440\u0435\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u0440\u043e\u0442\u043e\u043a\u043e\u043b\u0430 Link Layer Discovery Protocol (LLDP) \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u043e\u0439 \u0441\u0438\u0441\u0442\u0435\u043c\u044b NX-OS \u0432 \u0440\u0435\u0436\u0438\u043c\u0435 ACI Mode \u043c\u0430\u0440\u0448\u0440\u0443\u0442\u0438\u0437\u0430\u0442\u043e\u0440\u043e\u0432 Nexus 9000 Series \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0434\u043e\u0441\u0442\u0430\u0442\u043a\u0430\u043c\u0438 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044f \u0434\u043e\u0441\u0442\u0443\u043f\u0430. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0435 \u0430\u0432\u0442\u043e\u0440\u0438\u0437\u0430\u0446\u0438\u0438",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj\nhttps://nvd.nist.gov/vuln/detail/CVE-2021-1231",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u041e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u0430\u044f \u0441\u0438\u0441\u0442\u0435\u043c\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-284",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041d\u0438\u0437\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 3,3)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 4,7)"
}
GHSA-HPQM-FQWV-8FFG
Vulnerability from github – Published: 2022-05-24 17:42 – Updated: 2022-09-21 00:00A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic.
{
"affected": [],
"aliases": [
"CVE-2021-1231"
],
"database_specific": {
"cwe_ids": [
"CWE-284",
"CWE-346"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2021-02-24T20:15:00Z",
"severity": "MODERATE"
},
"details": "A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic.",
"id": "GHSA-hpqm-fqwv-8ffg",
"modified": "2022-09-21T00:00:42Z",
"published": "2022-05-24T17:42:58Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2021-1231"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"type": "CVSS_V3"
}
]
}
CNVD-2021-14794
Vulnerability from cnvd - Published: 2021-03-07厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj
| Name | Cisco Nexus 9000 |
|---|
{
"cves": {
"cve": {
"cveNumber": "CVE-2021-1231",
"cveUrl": "https://nvd.nist.gov/vuln/detail/CVE-2021-1231"
}
},
"description": "Cisco Nexus 9000 Series Fabric Switches\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u6b3e9000\u7cfb\u5217\u5149\u7ea4\u4ea4\u6362\u673a\u3002\n\nNexus 9000 Series Fabri\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7981\u7528SFP\u63a5\u53e3\u4e0a\u7684\u5207\u6362\uff0c\u8fd9\u53ef\u80fd\u4f1a\u4e2d\u65ad\u7f51\u7edc\u3002",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2021-14794",
"openTime": "2021-03-07",
"patchDescription": "Cisco Nexus 9000 Series Fabric Switches\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e00\u6b3e9000\u7cfb\u5217\u5149\u7ea4\u4ea4\u6362\u673a\u3002\r\n\r\nNexus 9000 Series Fabri\u5b58\u5728\u5b89\u5168\u6f0f\u6d1e\uff0c\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u7981\u7528SFP\u63a5\u53e3\u4e0a\u7684\u5207\u6362\uff0c\u8fd9\u53ef\u80fd\u4f1a\u4e2d\u65ad\u7f51\u7edc\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Nexus Series Fabri\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": "Cisco Nexus 9000"
},
"referenceLink": "https://nvd.nist.gov/vuln/detail/CVE-2021-1231",
"serverity": "\u4f4e",
"submitTime": "2021-02-25",
"title": "Nexus Series Fabri\u8bbf\u95ee\u63a7\u5236\u9519\u8bef\u6f0f\u6d1e"
}
GSD-2021-1231
Vulnerability from gsd - Updated: 2023-12-13 01:23{
"GSD": {
"alias": "CVE-2021-1231",
"description": "A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic.",
"id": "GSD-2021-1231"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2021-1231"
],
"details": "A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic.",
"id": "GSD-2021-1231",
"modified": "2023-12-13T01:23:23.101441Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"DATE_PUBLIC": "2021-02-24T16:00:00",
"ID": "CVE-2021-1231",
"STATE": "PUBLIC",
"TITLE": "Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco NX-OS System Software in ACI Mode ",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "Cisco"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic."
}
]
},
"exploit": [
{
"lang": "eng",
"value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory. "
}
],
"impact": {
"cvss": {
"baseScore": "4.7",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L ",
"version": "3.0"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-284"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210224 Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability",
"refsource": "CISCO",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj"
}
]
},
"source": {
"advisory": "cisco-sa-apic-lldap-dos-WerV9CFj",
"defect": [
[
"CSCvu84570"
]
],
"discovery": "INTERNAL"
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(4g\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(1s\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(3c\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(2i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(1b\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(1j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.3\\(2f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(4o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(2h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(1o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(2g\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(3h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(1c\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(2j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(2m\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(3f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(3i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(3k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(1r\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(2i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(4e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(4f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(1m\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(3e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.3\\(1i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.3\\(2h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.3\\(2i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(4l\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(1d\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(1e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(3n\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(3o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(4g\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(4h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.0\\(4q\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(3f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(4i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.1\\(4m\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(1i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(1k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(2h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(2j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.2\\(3m\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(1m\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(1n\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(1o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(1p\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(1q\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(2g\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(2h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(2l\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(2m\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.3\\(1e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.0\\(1k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.1\\(2m\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.1\\(2o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.1\\(2p\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.0\\(3d\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(2g\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(1i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(2f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(2n\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(2o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.0\\(1r\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.1\\(1h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.1\\(1i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.1\\(2e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.1\\(2g\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.1\\(2k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.1\\(3g\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.1\\(3h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.1\\(3j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.1\\(4a\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(1k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(1n\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(1o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(2e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(2f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(2i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(2j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(2k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(2q\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(3j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(3p\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(3r\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(3s\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(3t\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(4f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(4p\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(4q\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.2\\(4r\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.3\\(1f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.3\\(1i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.3\\(1l\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.3\\(1o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:12.3\\(1p\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.0\\(2h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.0\\(2k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.0\\(2n\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.1\\(1i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.1\\(2q\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.1\\(2s\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.1\\(2t\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.1\\(2u\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.1\\(2v\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(1l\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(1m\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(2l\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(2o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(3i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(3j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(3n\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(3o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(3r\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(3s\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(4d\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(4e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(5d\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(5e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(5f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(6i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(7f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(7k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(41d\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.3\\(1g\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.3\\(1h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.3\\(1j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.3\\(2j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:11.3\\(2k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(8d\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(9b\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(9f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:13.2\\(9h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.0\\(1h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.0\\(2c\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.0\\(3c\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(1i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(1j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(1k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(1l\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(2m\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(2o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(2s\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(2u\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(2w\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.1\\(2x\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(1j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(1l\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(2e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(2f\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(2g\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(3j\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(3l\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(3n\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(3q\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(4i\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(4k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(4o\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(4p\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:14.2\\(5k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:15.0\\(1k\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:15.0\\(1l\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:15.0\\(2e\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:nx-os:15.0\\(2h\\):*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2021-1231"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-346"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20210224 Cisco Nexus 9000 Series Fabric Switches ACI Mode Link Layer Discovery Protocol Port Denial of Service Vulnerability",
"refsource": "CISCO",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 5.5,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "LOW",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4
}
},
"lastModifiedDate": "2022-09-20T17:06Z",
"publishedDate": "2021-02-24T20:15Z"
}
}
}
FKIE_CVE-2021-1231
Vulnerability from fkie_nvd - Published: 2021-02-24 20:15 - Updated: 2024-11-21 05:434.7 (Medium) - CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C64CC640-B37D-4064-8946-B8CCCDE1A6EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E8983275-20C6-487E-A265-3836F06AB226",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CBCA0A4F-D475-405C-B9A7-EBB0A816B9C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(1e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA0E0039-23E1-425B-8B2C-DFE2C185CC8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(2j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9C3FB2AC-934D-4F12-9E9B-EA5F0731DA4D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(2m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BACE91F5-EC9B-4486-80F1-CFC3DA570B9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(3f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2C60E5B9-10AB-4A69-B28D-0D526756E6B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(3i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "979FEE23-2C28-4212-9DA5-10A0EAFE1668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(3k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9B610400-181F-4621-B27B-18C2609990DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(3n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4585B70C-E162-42FA-9CB8-42C1F34017AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(3o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EFC3F541-E417-4FC1-8C35-5B162F35F4F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(4g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "627482D8-0464-4B96-B36A-25D151F1525E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(4h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "788E6471-F000-45A7-9829-71F7AE5ED1B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(4o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BCD04718-6743-40A1-9115-A172D1C37835",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.0\\(4q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0277D6FD-2A73-45E9-ADA3-64998B7E4668",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CAA00485-725D-467C-9152-DF325507E248",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(1o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7D7ED5D0-12BD-483C-902B-CF1AE23611E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(1r\\):*:*:*:*:*:*:*",
"matchCriteriaId": "582C120A-DFA9-40F8-875A-C7875D9D93F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(1s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "040EFFE2-EE24-46EA-B77B-7FDCCF66923D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(2h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4FB814B0-24AE-4C62-9CCE-5D572D0FC0A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(2i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "92FAEF9F-724D-43E9-8916-BEF64A9B8F9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(3f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EA448665-A433-4C40-940D-1165C6A2777F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(4e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "061AC794-EDA5-4166-85D1-EA827685C0F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(4f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FFE372D3-4978-4C78-AE1A-14E29ED00D46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(4g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1A11D005-53E4-4575-8EAC-86F9DDB62FF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(4i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "952CC9AA-D03C-44F5-8600-78C1E20D0F9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(4l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "74F6CC3C-BFCB-4CD6-830E-6A2C29EB0923",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.1\\(4m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C27C3B5E-AD72-4A32-BE7B-885AE8DFB480",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A2C5F386-C135-4AED-9F96-388E324F09BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(1k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "669CF375-763C-4B83-8291-85F7CE8297F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(1m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9188E945-D4A9-47A7-8588-302762510C2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(2g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "36A00C1F-7270-4E2F-8420-8567336AD1C3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(2h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "22EE58D9-D1BF-41BD-B331-A3472D38B1D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(2i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "58B28302-6700-4B2C-9531-6BECA5113D70",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(2j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C470740F-386B-472E-AD18-D8954AD5BE78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E34C017B-E9C3-48B8-AB7E-0A8C6CD8788B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(3e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ED0CF9B2-356D-45C5-BFCD-94155E1A2F14",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(3h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2478A831-330D-4526-8A2C-DC8C0F6973ED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.2\\(3m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EAB57FD7-4350-4BFD-A6CF-EDA674AD31BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.3\\(1g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "71B4FF76-FBC5-4742-B784-90AFBE8E2767",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.3\\(1h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "28328D72-D898-48C4-B7A9-D97E321C9D99",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.3\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1569E0F4-33D1-408D-88DC-26822447F325",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.3\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FF454C26-1558-405A-B99C-ADF7A9E91B69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.3\\(2f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CA86F8E0-58FB-4CA5-9541-E9D55BED533D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.3\\(2h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F031ABAD-3D20-4374-ABBE-24D5C01BE910",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.3\\(2i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F227E127-08EE-4A86-956C-BBBDB49925A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.3\\(2j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D0CD7AC4-58DD-4795-AB15-EFA214111B42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:11.3\\(2k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "64581189-9370-487A-9196-D0421CB3636E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0BEE5B22-F9D3-4EAA-A552-7F0271080632",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "74DB471F-43AF-4E94-99B0-7D38CB3F5943",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9217FBFE-2708-440A-90F9-0562C159DE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1p\\):*:*:*:*:*:*:*",
"matchCriteriaId": "5BA5F46C-3172-4509-856F-703E0B517E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E07DC9A1-E4BA-474C-96C2-0B73704628AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(1r\\):*:*:*:*:*:*:*",
"matchCriteriaId": "027DCF27-E201-4713-A1AC-526C6CA04343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "40B05631-0319-4AFA-867A-2AECEAD449CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "771CD71E-4F24-4ACC-8D86-11429379093B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "906C7861-3266-445E-BBAB-64B757229A4F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "782E194A-E91E-4C72-A86A-5BD2B9CE19BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4CE062A4-FD32-41E5-A5B2-06BED72140E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "52016BB9-A37D-4F3A-BEB4-77CF84193652",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.0\\(2o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CE8D042D-35C6-4BDF-9CD7-9125B19DC415",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(1h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "50F91C27-4625-4CCD-B2EB-7F34F286AB2C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F65D3CE3-CA53-4A13-AD86-E59196B586FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "EC4633AD-6CBA-4E7B-BC9D-DCCBE1F2C7EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(2g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "04B6FAA5-D3CF-4463-9DE9-6F472DC78B2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(2k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A1A8E4CF-2EF7-45E8-A4FE-5BEA54617D71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(3g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B0A7F045-BE20-4B1D-8A0D-38A651B77EA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(3h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E8DB4683-C8B2-4013-85C5-A1B5F01790B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(3j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BF031A0E-9C92-4931-8433-EAF9F9BA0DE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.1\\(4a\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E66B8A3B-AE6E-4876-9C14-54B24F91229C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(1k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "57B9178C-DD7F-4FE4-BC24-7025F90A4E93",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(1n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A5288A19-E08E-4748-A6F8-C095746D8B92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(1o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4DBC06D8-E9B3-4400-A7E5-7EE6A3B8C9BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "46C5D5D2-B2B9-4A9A-84D5-6F04E3F8694F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FDFA97CC-F9AD-42A8-8FBE-D986E729336C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "49DCFBB0-E1DA-4F4D-877A-BC6075775EDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4E02BE71-98EB-494D-A808-42A3B2A0A72A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6B74C309-446F-4EAC-939E-43BC8167FE75",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(2q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0EA38368-8EE4-4480-9A9A-D12992108475",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BFCAE710-1789-4D3A-AC2E-E6A523037172",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3p\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E7A6830-C15E-4690-8C1A-5044A3B01C13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3r\\):*:*:*:*:*:*:*",
"matchCriteriaId": "69051EB0-D60F-4E30-8939-088E50422A0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D5135CDF-5991-4CC9-9C4C-CC0DADEA8C5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(3t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "00DF4FCE-1B71-4A28-989C-AE4C5F2B3343",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(4f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "A6049CBB-7445-4A77-867B-5D59DF0C9332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(4p\\):*:*:*:*:*:*:*",
"matchCriteriaId": "58BE5188-775E-42A9-BCCF-0DBACDDFC045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(4q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "762B4A37-3D8C-4172-A8FF-14F470CBDBFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.2\\(4r\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C9BCF174-6D01-4C1A-AF7F-B91EDD16E010",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "94E4F174-8F51-41AF-82C7-0CA577753191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "353FD814-0812-4B90-B8F0-D372E85CF40B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "71AF6628-3E98-4D66-B4A9-9EA16519719A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "E52B312E-9C91-40F7-BACB-1550D6632477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "746D1151-BEC2-4404-A7CF-651D8BFA3412",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:12.3\\(1p\\):*:*:*:*:*:*:*",
"matchCriteriaId": "52CE3E73-8EC6-49D1-837F-2FBFDD51802C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.0\\(1k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B774106E-DC00-4F79-A5F9-390483A9FBEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.0\\(2h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "26676350-6635-4B97-8A1E-250E06A177CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.0\\(2k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DA426885-C1FB-4DB5-900A-7C7882956BFE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.0\\(2n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "AA5C1581-9C53-4093-BBCA-67F57CE24C67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D548C85A-F98B-49BF-A6C3-ADEB60124822",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "970718D9-4789-414B-8ED2-FBF914B4047C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7C45D91E-5AA4-46B4-9A87-75480AC04732",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2p\\):*:*:*:*:*:*:*",
"matchCriteriaId": "973B7EE9-6B18-4D1D-8DEE-3C43D0CEB89C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "32083CFE-1DAE-4BE2-AFB9-B2806F809191",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B0D61DA2-28B2-49E5-8739-38113455BD09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2t\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2E20496D-D83C-4CD3-B1A3-EEE0D165F609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2u\\):*:*:*:*:*:*:*",
"matchCriteriaId": "71425F24-4C89-49C1-9B5E-68FAFE04F89C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.1\\(2v\\):*:*:*:*:*:*:*",
"matchCriteriaId": "310CF610-34E9-45F2-B01A-76DDEC40A040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09A32C04-1467-4564-A18E-EF2AAEF64244",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(1m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ED378075-D761-4D0D-8852-93616EA2F9BC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(2l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "0C9BD58D-3AE9-49C7-AE94-74878CD109B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(2o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "46D16C20-D68E-4118-B8D4-D6A2044DCD32",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ABCDA33D-8576-4DF6-90A1-710CA3F78F68",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D302931B-4425-40A6-BF7E-97FAB43D0778",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CEBC0A74-551B-4BD1-A59A-80C119362D60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F36E0CC9-7DD7-439B-B83F-F96DEF5B2A37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3r\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2F50E84B-7CAC-4832-96C5-9885F0F9DFC0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(3s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "DEB8A917-6F49-4636-AF8C-8C18BAACE661",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(4d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "79ECC89F-7F84-42E0-AF0F-4C9A609131E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(4e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "4A9AC0D9-D8D4-480F-B1B7-84D17AF4ABC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(5d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "28A0A2C2-6E9F-4A08-9ED8-6FD4E8203053",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(5e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FCE26439-5B15-48F4-8E02-CC45A76297A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(5f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "F8744322-4D27-44BB-9573-BDEC9E8F6B00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(6i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "83C1841C-9D9B-4A22-9080-724BC75A004E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(7f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3E54C78E-93FE-4E22-A37A-25D07AF7C7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(7k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ED709475-D435-492E-A295-3F3202CB6CC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(8d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "20DBADBC-106E-4D0D-B6F1-F5859AD84DE7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(9b\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B226BA8E-FC1E-44FF-9A91-837F355E53B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(9f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1BA59F5B-43FE-4051-9D27-F83A7A39141E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(9h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3883FD9C-0BCB-4865-81B6-854C8C4EC7DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:13.2\\(41d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "3A52F12E-8EAD-40B8-BB6D-54FAD8718AD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.0\\(1h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "B4F75D6B-D48A-4B5E-A1DF-EEBFEBFE6073",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.0\\(2c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "FB1B81AF-FC0F-42B6-98C0-BEC432C7BAC2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.0\\(3c\\):*:*:*:*:*:*:*",
"matchCriteriaId": "87C5BB7A-3B2B-4AE3-A626-04FD1BB1E9C8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.0\\(3d\\):*:*:*:*:*:*:*",
"matchCriteriaId": "BDEB393A-9687-4E52-9837-B2C9E8F22D58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7E1BE98A-95AE-4D11-B427-68D25FE60720",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "CD61CB15-1955-4A81-9F8E-02F207094260",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(1k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "455F4A6C-428C-494F-B70C-A891B83EBEF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "322088F6-DF10-4C58-92F3-0FFBF469A6B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "20BFA5E5-0ECC-4A1F-A936-1F325A810334",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2m\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7ECA1140-9DE0-4BC9-A381-A8DCB5BEA4A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "2F5FCA86-82A3-4540-B827-BD752D9E0465",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2s\\):*:*:*:*:*:*:*",
"matchCriteriaId": "6B8DE7D4-EFEC-487B-8250-251F9EA36BF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2u\\):*:*:*:*:*:*:*",
"matchCriteriaId": "83EA47AA-6F3B-4A48-81A0-2CA8D6696B27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2w\\):*:*:*:*:*:*:*",
"matchCriteriaId": "89662D5F-AEEC-4DEB-AB8B-6A95D0A4B1D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.1\\(2x\\):*:*:*:*:*:*:*",
"matchCriteriaId": "40D5076C-6C6F-44F9-91D7-D8F2FEB21310",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(1i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D8BA2854-BE27-45F8-AF6E-CF6C474CF15B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(1j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8296DD01-9CE0-4734-97A1-43250AD87453",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "77FC6FCC-9C86-43CB-A008-82E5C3E5B791",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "1AD71858-CA76-4BE3-8B4F-626959F6A342",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(2f\\):*:*:*:*:*:*:*",
"matchCriteriaId": "38F4C42B-D975-46B5-8A18-1D6F72A294F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(2g\\):*:*:*:*:*:*:*",
"matchCriteriaId": "58277DB8-BBC7-4639-8967-FCBAB029641E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(3j\\):*:*:*:*:*:*:*",
"matchCriteriaId": "7E6354B7-3CBA-4E09-93F6-B49717B2A78E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(3l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "C693C8FA-3324-4439-B177-6FAE387DB23D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(3n\\):*:*:*:*:*:*:*",
"matchCriteriaId": "949C0F31-77ED-49CC-870D-70104AA908A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(3q\\):*:*:*:*:*:*:*",
"matchCriteriaId": "007BDA28-37AD-4F37-B351-C3BE0B8418F4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(4i\\):*:*:*:*:*:*:*",
"matchCriteriaId": "9563DBDC-D2C0-4C7C-A246-EC95DC4581CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(4k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "09CF92FC-B053-4234-830F-683E06807545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(4o\\):*:*:*:*:*:*:*",
"matchCriteriaId": "61DF8B69-D0B7-455F-A50E-5930948BED49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(4p\\):*:*:*:*:*:*:*",
"matchCriteriaId": "724603DA-06C9-4E64-B495-A90AD9BF31E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:14.2\\(5k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "D1255013-E3BC-4048-BD50-4641C0048FA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:15.0\\(1k\\):*:*:*:*:*:*:*",
"matchCriteriaId": "ABBAFC12-85C7-4FD1-B46E-D8268D00DEE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:15.0\\(1l\\):*:*:*:*:*:*:*",
"matchCriteriaId": "8F988380-7BAE-4E9C-B1E2-D3F7389E2FB7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:15.0\\(2e\\):*:*:*:*:*:*:*",
"matchCriteriaId": "11E2E40A-CCD5-4CA7-826E-10923BED72E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:nx-os:15.0\\(2h\\):*:*:*:*:*:*:*",
"matchCriteriaId": "95A5C1D4-EAE5-4E3F-AFCC-96B1ECDA91EE",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD9C1F1-8582-4F67-A77D-97CBFECB88B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4283E433-7F8C-4410-B565-471415445811",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80AB6FB-32FD-43D7-A9F1-80FA47696210",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5B2E4C1-2627-4B9D-8E92-4B483F647651",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "557ED31C-C26A-4FAE-8B14-D06B49F7F08B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "11411BFD-3F4D-4309-AB35-A3629A360FB0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E663DE91-C86D-48DC-B771-FA72A8DF7A7C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A90184B3-C82F-4CE5-B2AD-97D5E4690871",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "40E40F42-632A-47DF-BE33-DC25B826310B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4AB89849-6DA4-4C9D-BC3F-EE0E41FD1901",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C47F6BF9-2ADB-41A4-8D7D-8BB00141BB23",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "07DE6F63-2C7D-415B-8C34-01EC05C062F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F423E45D-A6DD-4305-9C6A-EAB26293E53A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "102F91CD-DFB6-43D4-AE5B-DA157A696230",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E952A96A-0F48-4357-B7DD-1127D8827650",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F70D81F1-8B12-4474-9060-B4934D8A3873",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5394DE31-3863-4CA9-B7B1-E5227183100D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7349D69B-D8FA-4462-AA28-69DD18A652D9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FE4BB834-2C00-4384-A78E-AF3BCDDC58AF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B0D30D52-837F-4FDA-B8E5-A9066E9C6D2F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CE49B45-F2E9-491D-9C29-1B46E9CE14E2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B1CC5F78-E88B-4B82-9E3E-C73D3A49DE26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "91231DC6-2773-4238-8C14-A346F213B5E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DF88547-BAF4-47B0-9F60-80A30297FCEB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*",
"matchCriteriaId": "113772B6-E9D2-4094-9468-3F4E1A87D07D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C45A38D6-BED6-4FEF-AD87-A1E813695DE0",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F1FC2B1F-232E-4754-8076-CC82F3648730",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7CDD27C9-5EAF-4956-8AB7-740C84C9D4FC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:*",
"matchCriteriaId": "785FD17C-F32E-4042-9DDE-A89B3AAE0334",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*",
"matchCriteriaId": "17C7E3DB-8E1A-47AD-B1C5-61747DC0CFB9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF467E2-4567-426E-8F48-39669E0F514C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*",
"matchCriteriaId": "63842B25-8C32-4988-BBBD-61E9CB09B4F3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "68EA1FEF-B6B6-49FE-A0A4-5387F76303F8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4364ADB9-8162-451D-806A-B98924E6B2CF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B53BCB42-ED61-4FCF-8068-CB467631C63C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "49E0371B-FDE2-473C-AA59-47E1269D050F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "489D11EC-5A18-4F32-BC7C-AC1FCEC27222",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BC5293E-F2B4-46DC-85DA-167EA323FCFD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA022E77-6557-4A33-9A3A-D028E2DB669A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DDC2F709-AFBE-48EA-A3A2-DA1134534FB6",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Link Layer Discovery Protocol (LLDP) for Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, adjacent attacker to disable switching on a small form-factor pluggable (SFP) interface. This vulnerability is due to incomplete validation of the source of a received LLDP packet. An attacker could exploit this vulnerability by sending a crafted LLDP packet on an SFP interface to an affected device. A successful exploit could allow the attacker to disable switching on the SFP interface, which could disrupt network traffic."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el protocolo Link Layer Discovery Protocol (LLDP) para Nexus 9000 Series Fabric Switches en modo Application Centric Infrastructure (ACI) podr\u00eda permitir a un atacante adyacente no autenticado deshabilitar la conmutaci\u00f3n en una interfaz small form-factor pluggable (SFP).\u0026#xa0;Esta vulnerabilidad es debido a una comprobaci\u00f3n incompleta del origen de un paquete LLDP recibido.\u0026#xa0;Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de un paquete LLDP dise\u00f1ado en una interfaz SFP a un dispositivo afectado.\u0026#xa0;Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir al atacante deshabilitar la conmutaci\u00f3n en la interfaz SFP, lo que podr\u00eda interrumpir el tr\u00e1fico de la red"
}
],
"id": "CVE-2021-1231",
"lastModified": "2024-11-21T05:43:53.150",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "ADJACENT_NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 2.9,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:A/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"exploitabilityScore": 5.5,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "ADJACENT_NETWORK",
"availabilityImpact": "LOW",
"baseScore": 4.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L",
"version": "3.1"
},
"exploitabilityScore": 2.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-02-24T20:15:13.193",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-apic-lldap-dos-WerV9CFj"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-284"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-346"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.