Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-3875

Опубликовано: 17 мар. 2017
Источник: nvd
CVSS3: 5.3
CVSS2: 5
EPSS Низкий

Описание

An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.

Уязвимые конфигурации

Конфигурация 1

Одновременно

Одно из

cpe:2.3:o:cisco:nx-os:5.2\(4\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.1\(3\)s5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.1\(3\)s6:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.2\(1.121\)s0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:7.2\(1\)d1\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:7.3\(0\)zn\(0.161\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:7.3\(1\)n1\(0.1\):*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*

EPSS

Процентиль: 48%
0.00248
Низкий

5.3 Medium

CVSS3

5 Medium

CVSS2

Дефекты

CWE-20

Связанные уязвимости

CVSS3: 5.3
github
больше 3 лет назад

An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.

fstec
почти 9 лет назад

Уязвимость сетевой операционной системы NX-OS, позволяющая нарушителю обойти конфигурацию списка контроля доступа к определенному трафику

EPSS

Процентиль: 48%
0.00248
Низкий

5.3 Medium

CVSS3

5 Medium

CVSS2

Дефекты

CWE-20