CVE-2021-1387
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
24/02/2021
Last modified:
07/11/2023
Description
A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because the software improperly releases resources when it processes certain IPv6 packets that are destined to an affected device. An attacker could exploit this vulnerability by sending multiple crafted IPv6 packets to an affected device. A successful exploit could cause the network stack to run out of available buffers, impairing operations of control plane and management plane protocols and resulting in a DoS condition. Manual intervention would be required to restore normal operations on the affected device. For more information about the impact of this vulnerability, see the Details section of this advisory.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:cisco:unified_computing_system:*:*:*:*:*:*:*:* | 4.0 (including) | 4.0\(4k\) (excluding) |
| cpe:2.3:a:cisco:unified_computing_system:*:*:*:*:*:*:*:* | 4.1 (including) | 4.1\(1e\) (excluding) |
| cpe:2.3:h:cisco:ucs_64108:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(0\)n1\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(1\)n1\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(2\)n1\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(3\)n1\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(4\)n1\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(4\)n1\(1a\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(5\)n1\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(5\)n1\(1a\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(6\)n1\(1\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(6\)n1\(2s\):*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:nx-os:7.0\(6\)n1\(3s\):*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



