CVE-2021-1368 (CNNVD-202102-1563)
中文标题:
Cisco FXOS Software and Cisco NX-OS Software 缓冲区错误漏洞
英文标题:
Cisco FXOS and NX-OS Software Unidirectional Link Detection Denial of Service and Arbitrary Code Execution Vulnerability
漏洞描述
中文描述:
Cisco NX-OS Software和Cisco FXOS Software都是美国思科(Cisco)公司的产品。Cisco NX-OS Software是一套交换机使用的数据中心级操作系统软件。Cisco FXOS Software是一套运行在思科安全设备中的防火墙软件。 Cisco FXOS Software and Cisco NX-OS Software 存在安全漏洞,该漏洞输入验证不足造成的。
英文描述:
A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to execute arbitrary code with administrative privileges or cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending crafted Cisco UDLD protocol packets to a directly connected, affected device. A successful exploit could allow the attacker to execute arbitrary code with administrative privileges or cause the Cisco UDLD process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. The attacker needs full control of a directly connected device. That device must be connected over a port channel that has UDLD enabled. To trigger arbitrary code execution, both the UDLD-enabled port channel and specific system conditions must exist. In the absence of either the UDLD-enabled port channel or the system conditions, attempts to exploit this vulnerability will result in a DoS condition. It is possible, but highly unlikely, that an attacker could control the necessary conditions for exploitation. The CVSS score reflects this possibility. However, given the complexity of exploitation, Cisco has assigned a Medium Security Impact Rating (SIR) to this vulnerability.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Cisco | Cisco NX-OS Software | n/a | - | - |
cpe:2.3:a:cisco:cisco_nx-os_software:n_a:*:*:*:*:*:*:*
|
| cisco | nx-os | 8.4\(3.108\) | - | - |
cpe:2.3:o:cisco:nx-os:8.4\(3.108\):*:*:*:*:*:*:*
|
| cisco | nx-os | 8.4\(3.117\) | - | - |
cpe:2.3:o:cisco:nx-os:8.4\(3.117\):*:*:*:*:*:*:*
|
| cisco | nx-os | 7.0\(3\)i5\(2\) | - | - |
cpe:2.3:o:cisco:nx-os:7.0\(3\)i5\(2\):*:*:*:*:*:*:*
|
| cisco | nx-os | 7.0\(3\)i7\(9\) | - | - |
cpe:2.3:o:cisco:nx-os:7.0\(3\)i7\(9\):*:*:*:*:*:*:*
|
| cisco | nx-os | 9.3\(5\) | - | - |
cpe:2.3:o:cisco:nx-os:9.3\(5\):*:*:*:*:*:*:*
|
| cisco | nx-os | 7.3\(8\)n1\(1\) | - | - |
cpe:2.3:o:cisco:nx-os:7.3\(8\)n1\(1\):*:*:*:*:*:*:*
|
| cisco | nx-os | 7.3\(9\)n1\(0.823\) | - | - |
cpe:2.3:o:cisco:nx-os:7.3\(9\)n1\(0.823\):*:*:*:*:*:*:*
|
| cisco | unified_computing_system | * | - | - |
cpe:2.3:a:cisco:unified_computing_system:*:*:*:*:*:*:*:*
|
| cisco | firepower_extensible_operating_system | r231 | - | - |
cpe:2.3:o:cisco:firepower_extensible_operating_system:r231:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
CVSS评分详情
3.1 (cna)
HIGHCVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2021-1368 |
2025-11-11 15:20:45 | 2025-11-11 07:36:33 |
| NVD | nvd_CVE-2021-1368 |
2025-11-11 14:57:34 | 2025-11-11 07:44:55 |
| CNNVD | cnnvd_CNNVD-202102-1563 |
2025-11-11 15:10:35 | 2025-11-11 07:56:37 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 缓冲区错误
- cnnvd_id: 未提取 -> CNNVD-202102-1563
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- affected_products_count: 1 -> 10
- data_sources: ['cve'] -> ['cve', 'nvd']