CVE-2021-1367
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
24/02/2021
Last modified:
07/11/2023
Description
A vulnerability in the Protocol Independent Multicast (PIM) feature of Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by sending a crafted PIM packet to an affected device. A successful exploit could allow the attacker to cause a traffic loop, resulting in a DoS condition.
Impact
Base Score 3.x
4.30
Severity 3.x
MEDIUM
Base Score 2.0
2.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:nx-os:9.3\(5\):*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_9000v_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_92160yc-x_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_92300yc_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_92304qc_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_92348gc-x_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_9236c_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_9272q_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_93108tc-ex-24_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_93108tc-ex_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_93108tc-fx_switch:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



