We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-20371

Cisco Nexus 3550-F Switches Access Control List Programming Vulnerability



Description

A vulnerability in the access control list (ACL) programming of Cisco Nexus 3550-F Switches could allow an unauthenticated, remote attacker to send traffic that should be blocked to the management interface of an affected device.  This vulnerability exists because ACL deny rules are not properly enforced at the time of device reboot. An attacker could exploit this vulnerability by attempting to send traffic to the management interface of an affected device. A successful exploit could allow the attacker to send traffic to the management interface of the affected device.

Reserved 2023-11-08 | Published 2024-11-06 | Updated 2024-11-06 | Assigner cisco


MEDIUM: 5.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Problem types

Permissions, Privileges, and Access Control

Product status

Default status
unknown

3550-F_1.11.3
affected

3550-F_1.12.0
affected

3550-F_1.16.0
affected

3550-F_1.17.1
affected

3550-F_1.11.1
affected

3550-F_1.11.2
affected

3550-F_1.15.0
affected

3550-F_1.13.0
affected

3550-F_1.14.0
affected

References

sec.cloudapps.cisco.com/...cisco-sa-3550-acl-bypass-mhskZc2q (cisco-sa-3550-acl-bypass-mhskZc2q)

cve.org (CVE-2024-20371)

nvd.nist.gov (CVE-2024-20371)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-20371

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.