CVE-2017-3875 (GCVE-0-2017-3875)
Vulnerability from cvelistv5 – Published: 2017-03-17 22:00 – Updated: 2024-08-05 14:39
VLAI?
Summary
An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.
Severity ?
No CVSS data available.
CWE
- Access-Control Filtering Mechanisms Bypass Vulnerability
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Cisco Nexus 7000 Series Switches |
Affected:
Cisco Nexus 7000 Series Switches
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:39:41.333Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "1038049",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038049"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns"
},
{
"name": "96930",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/96930"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco Nexus 7000 Series Switches",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Cisco Nexus 7000 Series Switches"
}
]
}
],
"datePublic": "2017-03-17T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Access-Control Filtering Mechanisms Bypass Vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-07-11T09:57:01",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "1038049",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1038049"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns"
},
{
"name": "96930",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/96930"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2017-3875",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco Nexus 7000 Series Switches",
"version": {
"version_data": [
{
"version_value": "Cisco Nexus 7000 Series Switches"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Access-Control Filtering Mechanisms Bypass Vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "1038049",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038049"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns"
},
{
"name": "96930",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/96930"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2017-3875",
"datePublished": "2017-03-17T22:00:00",
"dateReserved": "2016-12-21T00:00:00",
"dateUpdated": "2024-08-05T14:39:41.333Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:5.2\\\\(4\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"356B4143-5184-491B-9D10-19D6536366CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:6.1\\\\(3\\\\)s5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C3D98CD1-AE44-4863-9B9B-8B16746E122C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:6.1\\\\(3\\\\)s6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3357A3F-C304-4D73-8E0A-74DC3B54913D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:6.2\\\\(1.121\\\\)s0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"710C34E7-0FCF-4182-9514-8E05C7273EFE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.2\\\\(1\\\\)d1\\\\(1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C18A0045-87F3-4782-81C5-0BF615EA9346\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.3\\\\(0\\\\)zn\\\\(0.161\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9D32F3A3-C0C6-44FE-8047-C2751BC0124B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:nx-os:7.3\\\\(1\\\\)n1\\\\(0.1\\\\):*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD92EECB-28FD-436C-98E6-488554EDFB18\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B22B3865-30E9-4B5A-A37D-DC33F1150FFE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"459A7F11-52BF-4AD6-B495-4C4D6C050493\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEACA55F-4335-4478-B608-EB92EE1D6C6D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5ABB175-81BE-4C46-BD2D-70016508BE22\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71F93299-A715-4E97-87FE-B1E248EA98BD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3D71B228-FFE5-45F7-ADCF-6D359ADA6D31\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F3AD807-5A0F-4DF5-9A7A-748205F409E7\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.\"}, {\"lang\": \"es\", \"value\": \"Vulnerabilidad en mecanismos de filtrado de control de acceso afecta a ciertos mecanismos de filtrado de control de acceso en los conmutadores Cisco Nexus serie 7000, lo que podr\\u00eda permitir a un atacante remoto no autenticado omitir el tr\\u00e1fico definido configurado en una lista de control de acceso (ACL) del sistema afectado. M\\u00e1s informaci\\u00f3n: CSCtz59354. Liberaciones conocidas conocidas: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.\"}]",
"id": "CVE-2017-3875",
"lastModified": "2024-11-21T03:26:17.600",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\", \"baseScore\": 5.3, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 1.4}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-03-17T22:59:00.470",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/96930\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038049\", \"source\": \"ykramarz@cisco.com\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/96930\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038049\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-20\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-3875\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2017-03-17T22:59:00.470\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.\"},{\"lang\":\"es\",\"value\":\"Vulnerabilidad en mecanismos de filtrado de control de acceso afecta a ciertos mecanismos de filtrado de control de acceso en los conmutadores Cisco Nexus serie 7000, lo que podr\u00eda permitir a un atacante remoto no autenticado omitir el tr\u00e1fico definido configurado en una lista de control de acceso (ACL) del sistema afectado. M\u00e1s informaci\u00f3n: CSCtz59354. Liberaciones conocidas conocidas: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N\",\"baseScore\":5.3,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":1.4}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:5.2\\\\(4\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"356B4143-5184-491B-9D10-19D6536366CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:6.1\\\\(3\\\\)s5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3D98CD1-AE44-4863-9B9B-8B16746E122C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:6.1\\\\(3\\\\)s6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3357A3F-C304-4D73-8E0A-74DC3B54913D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:6.2\\\\(1.121\\\\)s0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"710C34E7-0FCF-4182-9514-8E05C7273EFE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.2\\\\(1\\\\)d1\\\\(1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18A0045-87F3-4782-81C5-0BF615EA9346\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.3\\\\(0\\\\)zn\\\\(0.161\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D32F3A3-C0C6-44FE-8047-C2751BC0124B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:7.3\\\\(1\\\\)n1\\\\(0.1\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD92EECB-28FD-436C-98E6-488554EDFB18\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B22B3865-30E9-4B5A-A37D-DC33F1150FFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"459A7F11-52BF-4AD6-B495-4C4D6C050493\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEACA55F-4335-4478-B608-EB92EE1D6C6D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ABB175-81BE-4C46-BD2D-70016508BE22\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71F93299-A715-4E97-87FE-B1E248EA98BD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D71B228-FFE5-45F7-ADCF-6D359ADA6D31\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F3AD807-5A0F-4DF5-9A7A-748205F409E7\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/96930\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038049\",\"source\":\"psirt@cisco.com\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/96930\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038049\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…