We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability in the access control list (ACL) programming of Cisco Nexus 3550-F Switches could allow an unauthenticated, remote attacker to send traffic that should be blocked to the management interface of an affected device. This vulnerability exists because ACL deny rules are not properly enforced at the time of device reboot. An attacker could exploit this vulnerability by attempting to send traffic to the management interface of an affected device. A successful exploit could allow the attacker to send traffic to the management interface of the affected device.
Reserved 2023-11-08 | Published 2024-11-06 | Updated 2024-11-06 | Assigner ciscoPermissions, Privileges, and Access Control
sec.cloudapps.cisco.com/...cisco-sa-3550-acl-bypass-mhskZc2q (cisco-sa-3550-acl-bypass-mhskZc2q)
Support options