CVE-2017-3875

Severity CVSS v4.0:
Pending analysis
Type:
CWE-20 Input Validation
Publication date:
17/03/2017
Last modified:
20/04/2025

Description

An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.

Vulnerable products and versions

CPE From Up to
cpe:2.3:o:cisco:nx-os:5.2\(4\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.1\(3\)s5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.1\(3\)s6:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.2\(1.121\)s0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:7.2\(1\)d1\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:7.3\(0\)zn\(0.161\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:7.3\(1\)n1\(0.1\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*