Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2024-20319

Summary
Assigner-cisco
Assigner Org ID-d1c1063e-7a18-46af-9102-31f8928bc633
Published At-13 Mar, 2024 | 16:47
Updated At-01 Aug, 2024 | 21:59
Rejected At-
Credits

A vulnerability in the UDP forwarding code of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to bypass configured management plane protection policies and access the Simple Network Management Plane (SNMP) server of an affected device. This vulnerability is due to incorrect UDP forwarding programming when using SNMP with management plane protection. An attacker could exploit this vulnerability by attempting to perform an SNMP operation using broadcast as the destination address that could be processed by an affected device that is configured with an SNMP server. A successful exploit could allow the attacker to communicate to the device on the configured SNMP ports. Although an unauthenticated attacker could send UDP datagrams to the configured SNMP port, only an authenticated user can retrieve or modify data using SNMP requests.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
â–¼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:cisco
Assigner Org ID:d1c1063e-7a18-46af-9102-31f8928bc633
Published At:13 Mar, 2024 | 16:47
Updated At:01 Aug, 2024 | 21:59
Rejected At:
â–¼CVE Numbering Authority (CNA)

A vulnerability in the UDP forwarding code of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to bypass configured management plane protection policies and access the Simple Network Management Plane (SNMP) server of an affected device. This vulnerability is due to incorrect UDP forwarding programming when using SNMP with management plane protection. An attacker could exploit this vulnerability by attempting to perform an SNMP operation using broadcast as the destination address that could be processed by an affected device that is configured with an SNMP server. A successful exploit could allow the attacker to communicate to the device on the configured SNMP ports. Although an unauthenticated attacker could send UDP datagrams to the configured SNMP port, only an authenticated user can retrieve or modify data using SNMP requests.

Affected Products
Vendor
Cisco Systems, Inc.Cisco
Product
Cisco IOS XR Software
Versions
Affected
  • 5.2.0
  • 5.2.1
  • 5.2.2
  • 5.2.4
  • 5.2.3
  • 5.2.5
  • 5.2.47
  • 5.3.0
  • 5.3.1
  • 5.3.2
  • 5.3.3
  • 5.3.4
  • 6.0.0
  • 6.0.1
  • 6.0.2
  • 6.1.1
  • 6.1.2
  • 6.1.3
  • 6.1.4
  • 6.1.12
  • 6.1.22
  • 6.1.32
  • 6.1.36
  • 6.1.42
  • 6.2.1
  • 6.2.2
  • 6.2.3
  • 6.2.25
  • 6.2.11
  • 6.3.2
  • 6.3.3
  • 6.3.15
  • 6.4.1
  • 6.4.2
  • 6.4.3
  • 6.5.1
  • 6.5.2
  • 6.5.3
  • 6.5.25
  • 6.5.26
  • 6.5.28
  • 6.5.29
  • 6.5.32
  • 6.5.33
  • 6.6.2
  • 6.6.3
  • 6.6.25
  • 6.6.4
  • 7.0.1
  • 7.0.2
  • 7.0.12
  • 7.0.14
  • 7.1.1
  • 7.1.15
  • 7.1.2
  • 7.1.3
  • 6.7.1
  • 6.7.2
  • 6.7.3
  • 6.7.4
  • 7.2.0
  • 7.2.1
  • 7.2.2
  • 7.3.1
  • 7.3.15
  • 7.3.2
  • 7.3.3
  • 7.3.5
  • 7.3.6
  • 7.4.1
  • 7.4.2
  • 6.8.1
  • 6.8.2
  • 7.5.1
  • 7.5.3
  • 7.5.2
  • 7.5.4
  • 7.5.5
  • 7.6.1
  • 7.6.2
  • 7.7.1
  • 7.7.2
  • 7.7.21
  • 6.9.1
  • 6.9.2
  • 7.8.1
  • 7.8.2
  • 7.9.1
  • 7.9.2
  • 7.9.21
  • 7.10.1
  • 7.10.2
  • 7.11.1
Problem Types
TypeCWE IDDescription
cweCWE-284Improper Access Control
Type: cwe
CWE ID: CWE-284
Description: Improper Access Control
Metrics
VersionBase scoreBase severityVector
3.14.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

The Cisco PSIRT is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF
N/A
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF
Resource: N/A
â–¼Authorized Data Publishers (ADP)
1. CISA ADP Vulnrichment
Affected Products
Vendor
Cisco Systems, Inc.cisco
Product
ios_xr
CPEs
  • cpe:2.3:o:cisco:ios_xr:5.2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.2.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.2.5:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.2.47:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.3.0:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.3.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.3.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:5.3.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.0.0:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.1.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.1.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.1.12:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.1.22:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.1.32:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.1.36:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.1.42:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.2.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.2.25:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.2.11:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.3.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.3.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.3.15:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.4.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.5.25:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.5.26:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.5.28:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.5.29:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.5.32:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.5.33:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.0.12:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.0.14:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.1.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.7.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.7.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.2.0:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.3.15:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.3.5:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.3.6:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.8.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.5.3:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.5.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.5.4:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.5.5:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.6.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.6.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.7.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.7.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.7.21:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.9.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:6.9.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.8.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.8.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.9.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.9.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.9.21:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.10.1:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.10.2:*:*:*:*:*:*:*
  • cpe:2.3:o:cisco:ios_xr:7.11.1:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
  • 5.2.0
  • 5.2.1
  • 5.2.2
  • 5.2.4
  • 5.2.3
  • 5.2.5
  • 5.2.47
  • 5.3.0
  • 5.3.1
  • 5.3.2
  • 5.3.3
  • 5.3.4
  • 6.0.0
  • 6.0.1
  • 6.0.2
  • 6.1.1
  • 6.1.2
  • 6.1.3
  • 6.1.4
  • 6.1.12
  • 6.1.22
  • 6.1.32
  • 6.1.36
  • 6.1.42
  • 6.2.1
  • 6.2.2
  • 6.2.3
  • 6.2.25
  • 6.2.11
  • 6.3.2
  • 6.3.3
  • 6.3.15
  • 6.4.1
  • 6.4.2
  • 6.4.3
  • 6.5.1
  • 6.5.2
  • 6.5.3
  • 6.5.25
  • 6.5.26
  • 6.5.28
  • 6.5.29
  • 6.5.32
  • 6.5.33
  • 6.6.2
  • 6.6.3
  • 6.6.25
  • 6.6.4
  • 7.0.1
  • 7.0.2
  • 7.0.12
  • 7.0.14
  • 7.1.1
  • 7.1.15
  • 7.1.2
  • 7.1.3
  • 6.7.1
  • 6.7.2
  • 6.7.3
  • 6.7.4
  • 7.2.0
  • 7.2.1
  • 7.2.2
  • 7.3.1
  • 7.3.15
  • 7.3.2
  • 7.3.3
  • 7.3.5
  • 7.3.6
  • 7.4.1
  • 7.4.2
  • 6.8.1
  • 6.8.2
  • 7.5.1
  • 7.5.3
  • 7.5.2
  • 7.5.4
  • 7.5.5
  • 7.6.1
  • 7.6.2
  • 7.7.1
  • 7.7.2
  • 7.7.21
  • 6.9.1
  • 6.9.2
  • 7.8.1
  • 7.8.2
  • 7.9.1
  • 7.9.2
  • 7.9.21
  • 7.10.1
  • 7.10.2
  • 7.11.1
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
2. CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF
x_transferred
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF
Resource:
x_transferred
Information is not available yet
â–¼National Vulnerability Database (NVD)
nvd.nist.gov
Source:psirt@cisco.com
Published At:13 Mar, 2024 | 17:15
Updated At:07 Jul, 2025 | 15:49

A vulnerability in the UDP forwarding code of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to bypass configured management plane protection policies and access the Simple Network Management Plane (SNMP) server of an affected device. This vulnerability is due to incorrect UDP forwarding programming when using SNMP with management plane protection. An attacker could exploit this vulnerability by attempting to perform an SNMP operation using broadcast as the destination address that could be processed by an affected device that is configured with an SNMP server. A successful exploit could allow the attacker to communicate to the device on the configured SNMP ports. Although an unauthenticated attacker could send UDP datagrams to the configured SNMP port, only an authenticated user can retrieve or modify data using SNMP requests.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.14.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Primary3.14.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Type: Secondary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Type: Primary
Version: 3.1
Base score: 4.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CPE Matches

Cisco Systems, Inc.
cisco
>>ios_xr>>5.2.0
cpe:2.3:o:cisco:ios_xr:5.2.0:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.2.1
cpe:2.3:o:cisco:ios_xr:5.2.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.2.2
cpe:2.3:o:cisco:ios_xr:5.2.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.2.3
cpe:2.3:o:cisco:ios_xr:5.2.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.2.4
cpe:2.3:o:cisco:ios_xr:5.2.4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.2.5
cpe:2.3:o:cisco:ios_xr:5.2.5:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.2.47
cpe:2.3:o:cisco:ios_xr:5.2.47:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.3.0
cpe:2.3:o:cisco:ios_xr:5.3.0:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.3.1
cpe:2.3:o:cisco:ios_xr:5.3.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.3.2
cpe:2.3:o:cisco:ios_xr:5.3.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.3.3
cpe:2.3:o:cisco:ios_xr:5.3.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>5.3.4
cpe:2.3:o:cisco:ios_xr:5.3.4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.0.0
cpe:2.3:o:cisco:ios_xr:6.0.0:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.0.1
cpe:2.3:o:cisco:ios_xr:6.0.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.0.2
cpe:2.3:o:cisco:ios_xr:6.0.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.1.1
cpe:2.3:o:cisco:ios_xr:6.1.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.1.2
cpe:2.3:o:cisco:ios_xr:6.1.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.1.3
cpe:2.3:o:cisco:ios_xr:6.1.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.1.4
cpe:2.3:o:cisco:ios_xr:6.1.4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.1.12
cpe:2.3:o:cisco:ios_xr:6.1.12:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.1.22
cpe:2.3:o:cisco:ios_xr:6.1.22:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.1.32
cpe:2.3:o:cisco:ios_xr:6.1.32:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.1.36
cpe:2.3:o:cisco:ios_xr:6.1.36:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.1.42
cpe:2.3:o:cisco:ios_xr:6.1.42:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.2.1
cpe:2.3:o:cisco:ios_xr:6.2.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.2.2
cpe:2.3:o:cisco:ios_xr:6.2.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.2.3
cpe:2.3:o:cisco:ios_xr:6.2.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.2.11
cpe:2.3:o:cisco:ios_xr:6.2.11:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.2.25
cpe:2.3:o:cisco:ios_xr:6.2.25:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.3.2
cpe:2.3:o:cisco:ios_xr:6.3.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.3.3
cpe:2.3:o:cisco:ios_xr:6.3.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.3.15
cpe:2.3:o:cisco:ios_xr:6.3.15:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.4.1
cpe:2.3:o:cisco:ios_xr:6.4.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.4.2
cpe:2.3:o:cisco:ios_xr:6.4.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.4.3
cpe:2.3:o:cisco:ios_xr:6.4.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.5.1
cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.5.2
cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.5.3
cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.5.25
cpe:2.3:o:cisco:ios_xr:6.5.25:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.5.26
cpe:2.3:o:cisco:ios_xr:6.5.26:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.5.28
cpe:2.3:o:cisco:ios_xr:6.5.28:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.5.29
cpe:2.3:o:cisco:ios_xr:6.5.29:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.5.32
cpe:2.3:o:cisco:ios_xr:6.5.32:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.5.33
cpe:2.3:o:cisco:ios_xr:6.5.33:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.6.2
cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.6.3
cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.6.4
cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.6.25
cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.7.1
cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xr>>6.7.2
cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-284Secondarypsirt@cisco.com
NVD-CWE-noinfoPrimarynvd@nist.gov
CWE ID: CWE-284
Type: Secondary
Source: psirt@cisco.com
CWE ID: NVD-CWE-noinfo
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeFpsirt@cisco.com
Vendor Advisory
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeFaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-snmp-uhv6ZDeF
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

183Records found

CVE-2023-20237
Matching Score-10
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-10
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.05% / 15.83%
||
7 Day CHG~0.00%
Published-16 Aug, 2023 | 21:00
Updated-02 Aug, 2024 | 09:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco Intersight Virtual Appliance could allow an unauthenticated, adjacent attacker to access internal HTTP services that are otherwise inaccessible. This vulnerability is due to insufficient restrictions on internally accessible http proxies. An attacker could exploit this vulnerability by submitting a crafted CLI command. A successful exploit could allow the attacker access to internal subnets beyond the sphere of their intended access level.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-intersight_virtual_applianceintersight_assistintersight_connected_virtual_applianceintersight_private_virtual_applianceCisco Intersight Virtual Appliance
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CVE-2021-34777
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.18% / 39.45%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:45
Updated-07 Nov, 2024 | 21:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-business_220-8t-e-2gbusiness_220-24p-4xbusiness_220-48t-4x_firmwarebusiness_220-16t-2g_firmwarebusiness_220-8t-e-2g_firmwarebusiness_220-16p-2g_firmwarebusiness_220-16p-2gbusiness_220-24t-4gbusiness_220-24p-4gbusiness_220-8fp-e-2gbusiness_220-24t-4g_firmwarebusiness_220-48p-4x_firmwarebusiness_220-48fp-4x_firmwarebusiness_220-24fp-4g_firmwarebusiness_220-48t-4g_firmwarebusiness_220-48t-4xbusiness_220-24fp-4x_firmwarebusiness_220-8p-e-2g_firmwarebusiness_220-24p-4x_firmwarebusiness_220-48p-4gbusiness_220-24t-4xbusiness_220-24p-4g_firmwarebusiness_220-48t-4gbusiness_220-48p-4xbusiness_220-24t-4x_firmwarebusiness_220-24fp-4xbusiness_220-16t-2gbusiness_220-48p-4g_firmwarebusiness_220-8fp-e-2g_firmwarebusiness_220-48fp-4xbusiness_220-24fp-4gbusiness_220-8p-e-2gCisco Small Business 200 Series Smart Switches
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-34776
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.13% / 32.53%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:45
Updated-07 Nov, 2024 | 21:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-business_220-8t-e-2gbusiness_220-24p-4xbusiness_220-48t-4x_firmwarebusiness_220-16t-2g_firmwarebusiness_220-8t-e-2g_firmwarebusiness_220-16p-2g_firmwarebusiness_220-16p-2gbusiness_220-24t-4gbusiness_220-24p-4gbusiness_220-8fp-e-2gbusiness_220-24t-4g_firmwarebusiness_220-48p-4x_firmwarebusiness_220-48fp-4x_firmwarebusiness_220-24fp-4g_firmwarebusiness_220-48t-4g_firmwarebusiness_220-48t-4xbusiness_220-24fp-4x_firmwarebusiness_220-8p-e-2g_firmwarebusiness_220-24p-4x_firmwarebusiness_220-48p-4gbusiness_220-24t-4xbusiness_220-24p-4g_firmwarebusiness_220-48t-4gbusiness_220-48p-4xbusiness_220-24t-4x_firmwarebusiness_220-24fp-4xbusiness_220-16t-2gbusiness_220-48p-4g_firmwarebusiness_220-8fp-e-2g_firmwarebusiness_220-48fp-4xbusiness_220-24fp-4gbusiness_220-8p-e-2gCisco Small Business 200 Series Smart Switches
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-34779
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.09% / 26.22%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:45
Updated-07 Nov, 2024 | 21:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-business_220-8t-e-2gbusiness_220-24p-4xbusiness_220-48t-4x_firmwarebusiness_220-16t-2g_firmwarebusiness_220-8t-e-2g_firmwarebusiness_220-16p-2g_firmwarebusiness_220-16p-2gbusiness_220-24t-4gbusiness_220-24p-4gbusiness_220-8fp-e-2gbusiness_220-24t-4g_firmwarebusiness_220-48p-4x_firmwarebusiness_220-48fp-4x_firmwarebusiness_220-24fp-4g_firmwarebusiness_220-48t-4g_firmwarebusiness_220-48t-4xbusiness_220-24fp-4x_firmwarebusiness_220-8p-e-2g_firmwarebusiness_220-24p-4x_firmwarebusiness_220-48p-4gbusiness_220-24t-4xbusiness_220-24p-4g_firmwarebusiness_220-48t-4gbusiness_220-48p-4xbusiness_220-24t-4x_firmwarebusiness_220-24fp-4xbusiness_220-16t-2gbusiness_220-48p-4g_firmwarebusiness_220-8fp-e-2g_firmwarebusiness_220-48fp-4xbusiness_220-24fp-4gbusiness_220-8p-e-2gCisco Small Business 200 Series Smart Switches
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-34775
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.13% / 32.53%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:45
Updated-07 Nov, 2024 | 21:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-business_220-8t-e-2gbusiness_220-24p-4xbusiness_220-48t-4x_firmwarebusiness_220-16t-2g_firmwarebusiness_220-8t-e-2g_firmwarebusiness_220-16p-2gbusiness_220-16p-2g_firmwarebusiness_220-24t-4gbusiness_220-24p-4gbusiness_220-8fp-e-2gbusiness_220-24t-4g_firmwarebusiness_220-48p-4x_firmwarebusiness_220-48fp-4x_firmwarebusiness_220-24fp-4g_firmwarebusiness_220-48t-4g_firmwarebusiness_220-48t-4xbusiness_220-24fp-4x_firmwarebusiness_220-8p-e-2g_firmwarebusiness_220-24p-4x_firmwarebusiness_220-48p-4gbusiness_220-24t-4xbusiness_220-24p-4g_firmwarebusiness_220-48t-4gbusiness_220-48p-4xbusiness_220-24t-4x_firmwarebusiness_220-24fp-4xbusiness_220-16t-2gbusiness_220-48p-4g_firmwarebusiness_220-8fp-e-2g_firmwarebusiness_220-48fp-4xbusiness_220-24fp-4gbusiness_220-8p-e-2gCisco Small Business 200 Series Smart Switches
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2021-34778
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.18% / 39.45%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:45
Updated-07 Nov, 2024 | 21:49
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-business_220-8t-e-2gbusiness_220-24p-4xbusiness_220-48t-4x_firmwarebusiness_220-16t-2g_firmwarebusiness_220-8t-e-2g_firmwarebusiness_220-16p-2g_firmwarebusiness_220-16p-2gbusiness_220-24t-4gbusiness_220-24p-4gbusiness_220-8fp-e-2gbusiness_220-24t-4g_firmwarebusiness_220-48p-4x_firmwarebusiness_220-48fp-4x_firmwarebusiness_220-24fp-4g_firmwarebusiness_220-48t-4g_firmwarebusiness_220-48t-4xbusiness_220-24fp-4x_firmwarebusiness_220-8p-e-2g_firmwarebusiness_220-24p-4x_firmwarebusiness_220-48p-4gbusiness_220-24t-4xbusiness_220-24p-4g_firmwarebusiness_220-48t-4gbusiness_220-48p-4xbusiness_220-24t-4x_firmwarebusiness_220-24fp-4xbusiness_220-16t-2gbusiness_220-48p-4g_firmwarebusiness_220-8fp-e-2g_firmwarebusiness_220-48fp-4xbusiness_220-24fp-4gbusiness_220-8p-e-2gCisco Small Business 200 Series Smart Switches
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-20365
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.03% / 8.96%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 16:40
Updated-15 Oct, 2025 | 16:04
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the IPv6 Router Advertisement (RA) packet processing of Cisco Access Point Software could allow an unauthenticated, adjacent attacker to modify the IPv6 gateway on an affected device. This vulnerability is due to a logic error in the processing of IPv6 RA packets that are received from wireless clients. An attacker could exploit this vulnerability by associating to a wireless network and sending a series of crafted IPv6 RA packets. A successful exploit could allow the attacker to temporarily change the IPv6 gateway of an affected device. This could also lead to intermittent packet loss for any wireless clients that are associated with the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco Aironet Access Point Software (IOS XE Controller)
CWE ID-CWE-940
Improper Verification of Source of a Communication Channel
CVE-2021-34780
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.14% / 34.02%
||
7 Day CHG~0.00%
Published-06 Oct, 2021 | 19:45
Updated-07 Nov, 2024 | 21:50
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Small Business 220 Series Smart Switches Link Layer Discovery Protocol Vulnerabilities

Multiple vulnerabilities exist in the Link Layer Discovery Protocol (LLDP) implementation for Cisco Small Business 220 Series Smart Switches. An unauthenticated, adjacent attacker could perform the following: Execute code on the affected device or cause it to reload unexpectedly Cause LLDP database corruption on the affected device For more information about these vulnerabilities, see the Details section of this advisory. Note: LLDP is a Layer 2 protocol. To exploit these vulnerabilities, an attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). Cisco has released firmware updates that address these vulnerabilities.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-business_220-8t-e-2gbusiness_220-24p-4xbusiness_220-48t-4x_firmwarebusiness_220-16t-2g_firmwarebusiness_220-8t-e-2g_firmwarebusiness_220-16p-2g_firmwarebusiness_220-16p-2gbusiness_220-24t-4gbusiness_220-24p-4gbusiness_220-8fp-e-2gbusiness_220-24t-4g_firmwarebusiness_220-48p-4x_firmwarebusiness_220-48fp-4x_firmwarebusiness_220-24fp-4g_firmwarebusiness_220-48t-4g_firmwarebusiness_220-48t-4xbusiness_220-24fp-4x_firmwarebusiness_220-8p-e-2g_firmwarebusiness_220-24p-4x_firmwarebusiness_220-48p-4gbusiness_220-24t-4xbusiness_220-24p-4g_firmwarebusiness_220-48t-4gbusiness_220-48p-4xbusiness_220-24t-4x_firmwarebusiness_220-24fp-4xbusiness_220-16t-2gbusiness_220-48p-4g_firmwarebusiness_220-8fp-e-2g_firmwarebusiness_220-48fp-4xbusiness_220-24fp-4gbusiness_220-8p-e-2gCisco Small Business 200 Series Smart Switches
CWE ID-CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
CVE-2025-20364
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.02% / 3.41%
||
7 Day CHG~0.00%
Published-24 Sep, 2025 | 16:40
Updated-15 Oct, 2025 | 16:05
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Device Analytics action frame processing of Cisco Wireless Access Point (AP) Software could allow an unauthenticated, adjacent attacker to inject wireless 802.11 action frames with arbitrary information. This vulnerability is due to insufficient verification checks of incoming 802.11 action frames. An attacker could exploit this vulnerability by sending 802.11 Device Analytics action frames with arbitrary parameters. A successful exploit could allow the attacker to inject Device Analytics action frames with arbitrary information, which could modify the Device Analytics data of valid wireless clients that are connected to the same wireless controller.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco Aironet Access Point Software (IOS XE Controller)
CWE ID-CWE-346
Origin Validation Error
CVE-2020-3222
Matching Score-8
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-8
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.07% / 20.95%
||
7 Day CHG~0.00%
Published-03 Jun, 2020 | 17:41
Updated-15 Nov, 2024 | 17:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Web UI Unauthenticated Proxy Service Vulnerability

A vulnerability in the web-based user interface (web UI) of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to bypass access control restrictions on an affected device. The vulnerability is due to the presence of a proxy service at a specific endpoint of the web UI. An attacker could exploit this vulnerability by connecting to the proxy service. An exploit could allow the attacker to bypass access restrictions on the network by proxying their access request through the management network of the affected device. As the proxy is reached over the management virtual routing and forwarding (VRF), this could reduce the effectiveness of the bypass.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software 16.10.1
CWE ID-CWE-17
Not Available
CVE-2015-4302
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.4||MEDIUM
EPSS-0.70% / 71.52%
||
7 Day CHG~0.00%
Published-19 Aug, 2015 | 14:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The web interface in Cisco FireSIGHT Management Center 5.3.1.4 allows remote attackers to delete arbitrary system policies via modified parameters in a POST request, aka Bug ID CSCuu25390.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-firesight_system_softwaren/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-6366
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.36% / 58.03%
||
7 Day CHG~0.00%
Published-13 Nov, 2015 | 02:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco IOS 15.2(04)M6 and 15.4(03)S lets physical-interface ACLs supersede tunnel-interface ACLs, which allows remote attackers to bypass intended network-traffic restrictions in opportunistic circumstances by using a tunnel, aka Bug ID CSCur01042.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-iosn/a
CWE ID-CWE-284
Improper Access Control
CVE-2021-1583
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.4||MEDIUM
EPSS-0.16% / 36.54%
||
7 Day CHG~0.00%
Published-25 Aug, 2021 | 19:10
Updated-07 Nov, 2024 | 22:02
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus 9000 Series Fabric Switches ACI Mode Arbitrary File Read Vulnerability

A vulnerability in the fabric infrastructure file system access control of Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to read arbitrary files on an affected system. This vulnerability is due to improper access control. An attacker with Administrator privileges could exploit this vulnerability by executing a specific vulnerable command on an affected device. A successful exploit could allow the attacker to read arbitrary files on the file system of the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93180lc-exnexus_9332pqnexus_93108tc-exnx-osnexus_9372pxnexus_9364c-gxnexus_9508nexus_93108tc-fx-24nexus_92304qcnexus_93120txnexus_92160yc-xnexus_93128txnexus_9316d-gxnexus_93108tc-ex-24nexus_9000nexus_9372tx-enexus_93108tc-fx3pnexus_93108tc-fxnexus_93360yc-fx2nexus_9396txnexus_93180yc-fx3snexus_9332cnexus_9364cnexus_92300ycnexus_92348gc-xnexus_9336c-fx2nexus_9348gc-fxpnexus_9272qnexus_93180yc-fx-24nexus_9336c-fx2-enexus_9396pxnexus_93216tc-fx2nexus_93240yc-fx2nexus_93180yc-fxnexus_9372txnexus_93180yc-exnexus_93600cd-gxnexus_9000vnexus_9372px-enexus_9236cnexus_93180yc-fx3nexus_93180yc-ex-24Cisco NX-OS System Software in ACI Mode
CWE ID-CWE-284
Improper Access Control
CVE-2015-4299
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.55% / 67.45%
||
7 Day CHG~0.00%
Published-19 Aug, 2015 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Unified Web and E-Mail Interaction Manager 9.0(2) improperly performs authorization, which allows remote authenticated users to remove default messaging-queue system folders via unspecified vectors, aka Bug ID CSCuo89046.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_web_and_e-mail_interaction_managern/a
CWE ID-CWE-284
Improper Access Control
CVE-2021-1389
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.38% / 59.11%
||
7 Day CHG~0.00%
Published-04 Feb, 2021 | 16:40
Updated-08 Nov, 2024 | 23:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR and Cisco NX-OS Software IPv6 Access Control List Bypass Vulnerability

A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A successful exploit could allow the attacker to access resources that would typically be protected by the interface ACL.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ncs_5502-sencs_5508ncs_5501ncs_540ncs_560nx-osncs_5516nexus_9500_rnexus_3600ios_xrncs_5502ncs_5501-seCisco IOS XR Software
CWE ID-CWE-284
Improper Access Control
CVE-2015-4298
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.55% / 67.45%
||
7 Day CHG~0.00%
Published-19 Aug, 2015 | 15:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Unified Web and E-Mail Interaction Manager 9.0(2) and 11.0(1) improperly performs authorization, which allows remote authenticated users to read or write to stored data via unspecified vectors, aka Bug ID CSCuo89056.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-unified_web_and_e-mail_interaction_managern/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-0660
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.2||HIGH
EPSS-0.05% / 16.44%
||
7 Day CHG~0.00%
Published-14 Mar, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco Virtual TelePresence Server Software does not properly restrict use of the serial port, which allows local users to execute arbitrary OS commands as root by leveraging vSphere controller administrative privileges, aka Bug ID CSCus61123.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_server_softwaren/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-0675
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.3||HIGH
EPSS-0.21% / 43.76%
||
7 Day CHG~0.00%
Published-13 Apr, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The failover ipsec implementation in Cisco Adaptive Security Appliance (ASA) Software 9.1 before 9.1(6), 9.2 before 9.2(3.3), and 9.3 before 9.3(3) does not properly validate failover communication messages, which allows remote attackers to reconfigure an ASA device, and consequently obtain administrative control, by sending crafted UDP packets over the local network to the failover interface, aka Bug ID CSCur21069.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-adaptive_security_appliance_softwaren/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-0694
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.36% / 58.03%
||
7 Day CHG~0.00%
Published-11 Apr, 2015 | 01:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco ASR 9000 devices with software 5.3.0.BASE do not recognize that certain ACL entries have a single-host constraint, which allows remote attackers to bypass intended network-resource access restrictions by using an address that was not supposed to have been allowed, aka Bug ID CSCur28806.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-ios_xrasr_9904asr_9922asr_9001asr_9006asr_9010asr_9912n/a
CWE ID-CWE-284
Improper Access Control
CVE-2015-0667
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5||MEDIUM
EPSS-0.36% / 58.03%
||
7 Day CHG~0.00%
Published-18 Mar, 2015 | 23:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

The Management Interface on Cisco Content Services Switch (CSS) 11500 devices 8.20.4.02 and earlier allows remote attackers to bypass intended restrictions on local-network device access via crafted SSH packets, aka Bug ID CSCut14855.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-content_services_switch_11500content_services_switch_11500_firmwaren/a
CWE ID-CWE-284
Improper Access Control
CVE-2024-20263
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.02% / 4.70%
||
7 Day CHG~0.00%
Published-26 Jan, 2024 | 17:27
Updated-13 Nov, 2024 | 14:55
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability with the access control list (ACL) management within a stacked switch configuration of Cisco Business 250 Series Smart Switches and Business 350 Series Managed Switches could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. This vulnerability is due to incorrect processing of ACLs on a stacked configuration when either the primary or backup switches experience a full stack reload or power cycle. An attacker could exploit this vulnerability by sending crafted traffic through an affected device. A successful exploit could allow the attacker to bypass configured ACLs, causing traffic to be dropped or forwarded in an unexpected manner. The attacker does not have control over the conditions that result in the device being in the vulnerable state. Note: In the vulnerable state, the ACL would be correctly applied on the primary devices but could be incorrectly applied to the backup devices.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-sf550x-48mpcbs250-48t-4x_firmwarecbs350-48t-4gcbs350-24mgp-4x_firmwarecbs350-8xtcbs350-8p-2gcbs350-24xtsg350x-24mpsg550x-48p_firmwarecbs250-8p-e-2g_firmwaresg550x-48tcbs250-48p-4x_firmwarecbs250-24pp-4g_firmwarecbs250-8pp-e-2g_firmwarecbs350-48p-4gcbs350-24xts_firmwaresg350x-48_firmwaresg550xg-8f8t_firmwaresg350xg-24tcbs350-12xt_firmwarecbs350-8xt_firmwarecbs350-48ngp-4x_firmwaresg350x-24_firmwaresg550x-48mp_firmwarecbs350-24t-4x_firmwarecbs350-16t-e-2g_firmwarecbs350-48p-4g_firmwaresf550x-24mp_firmwarecbs350-16p-e-2g_firmwarecbs350-24p-4xcbs250-8pp-dsg350x-24mp_firmwarecbs350-24mgp-4xsf550x-48p_firmwaresg550x-48pcbs250-24fp-4gcbs350-8mgp-2xcbs250-24p-4xcbs350-24p-4gcbs250-16p-2g_firmwarecbs350-24xtssg350x-48mp_firmwaresg550xg-24f_firmwarecbs350-48p-4x_firmwarecbs350-16p-2g_firmwarecbs350-24fp-4g_firmwaresg350x-24cbs250-8t-e-2gcbs350-8mp-2x_firmwarecbs350-8fp-e-2gsf550x-48_firmwarecbs350-12xs_firmwarecbs350-16t-e-2gcbs350-48xt-4xsg550xg-8f8tcbs350-12xtcbs350-24p-4g_firmwaresg550xg-24tcbs350-24t-4xcbs350-24s-4g_firmwarecbs350-48fp-4g_firmwarecbs350-24p-4x_firmwarecbs350-16t-2gcbs250-48pp-4gcbs350-48p-4xcbs350-48t-4x_firmwarecbs250-48t-4gcbs350-24t-4g_firmwarecbs350-48t-4xcbs350-24ngp-4x_firmwarecbs350-48xt-4x_firmwarecbs250-16t-2gcbs350-8t-e-2g_firmwarecbs350-8fp-2g_firmwarecbs350-8mgp-2x_firmwarecbs250-24fp-4xsg550x-24_firmwarecbs350-8fp-2gcbs350-48fp-4gcbs250-48p-4g_firmwarecbs350-8s-e-2gcbs250-48t-4g_firmwaresg350xg-48t_firmwarecbs250-8t-dsf550x-48mp_firmwarecbs250-24p-4g_firmwaresf550x-24_firmwaresg350xg-2f10cbs350-24t-4gcbs250-8t-e-2g_firmwaresf550x-48psg550x-24mppsf550x-24sg350xg-24f_firmwarecbs250-24fp-4g_firmwaresg350x-48cbs350-48fp-4xcbs250-16p-2gcbs250-8fp-e-2g_firmwarecbs350-12xssg550x-24mp_firmwarecbs250-24t-4gcbs250-24p-4x_firmwarecbs350-8t-e-2gsg350xg-24t_firmwarecbs250-48p-4xsg550x-48_firmwaresf550x-24p_firmwaresg350x-24p_firmwarecbs350-24fp-4x_firmwaresg550x-24cbs350-24s-4gcbs250-8pp-e-2gcbs350-16t-2g_firmwaresg350xg-2f10_firmwarecbs250-24p-4gcbs250-24t-4x_firmwarecbs350-8p-e-2g_firmwaresg350xg-48tsf550x-48cbs250-24t-4g_firmwaresg550xg-24fcbs350-24xssg350x-48pcbs250-24fp-4x_firmwarecbs350-8mp-2xsg550x-24mpcbs350-16p-e-2gsg550x-48mpcbs350-8p-2g_firmwarecbs350-16fp-2gcbs350-24ngp-4xsf550x-24pcbs350-8p-e-2gcbs350-48fp-4x_firmwarecbs350-24fp-4xcbs250-24pp-4gsg550x-24p_firmwarecbs250-48pp-4g_firmwarecbs250-8p-e-2gcbs350-24fp-4gsg550x-24psg550xg-24t_firmwaresg550x-48t_firmwaresg350x-48mpcbs350-16fp-2g_firmwarecbs350-48ngp-4xsg550x-48sg350x-48p_firmwarecbs250-8t-d_firmwaresg350x-24pcbs250-48t-4xcbs350-8fp-e-2g_firmwaresf550x-24mpcbs250-24t-4xcbs250-8fp-e-2gcbs350-16p-2gsg550x-24mpp_firmwarecbs350-8s-e-2g_firmwarecbs350-48t-4g_firmwaresg350xg-24fcbs350-12np-4x_firmwarecbs350-24xt_firmwarecbs350-12np-4xcbs250-16t-2g_firmwarecbs350-16xtscbs350-16xts_firmwarecbs250-8pp-d_firmwarecbs250-48p-4gcbs350-24xs_firmwareCisco Small Business Smart and Managed Switches
CWE ID-CWE-284
Improper Access Control
CVE-2024-20283
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.22% / 44.82%
||
7 Day CHG~0.00%
Published-03 Apr, 2024 | 16:25
Updated-07 May, 2025 | 16:06
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in Cisco Nexus Dashboard could allow an authenticated, remote attacker to learn cluster deployment information on an affected device. This vulnerability is due to improper access controls on a specific API endpoint. An attacker could exploit this vulnerability by sending queries to the API endpoint. A successful exploit could allow an attacker to access metrics and information about devices in the Nexus Dashboard cluster.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_dashboardCisco Nexus Dashboard
CWE ID-CWE-284
Improper Access Control
CVE-2024-20373
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.62% / 69.66%
||
7 Day CHG~0.00%
Published-15 Nov, 2024 | 14:52
Updated-01 Aug, 2025 | 18:22
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS and Cisco IOS XE SNMP Extended ACL Bypass Vulnerability

A vulnerability in the implementation of the Simple Network Management Protocol (SNMP) IPv4 access control list (ACL) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to perform SNMP polling of an affected device, even if it is configured to deny SNMP traffic.  This vulnerability exists because Cisco IOS Software and Cisco IOS XE Software do not support extended IPv4 ACLs for SNMP, but they do allow administrators to configure extended named IPv4 ACLs that are attached to the SNMP server configuration without a warning message. This can result in no ACL being applied to the SNMP listening process. An attacker could exploit this vulnerability by performing SNMP polling of an affected device. A successful exploit could allow the attacker to perform SNMP operations that should be denied. The attacker has no control of the SNMP ACL configuration and would still need a valid SNMP version 2c (SNMPv2c) community string or SNMP version 3 (SNMPv3) user credentials. SNMP with IPv6 ACL configurations is not affected. For more information, see the section of this advisory.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xe_sd-wanCisco IOS XE Catalyst SD-WANios_xe_catalyst_sd-wan
CWE ID-CWE-284
Improper Access Control
CVE-2024-20322
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.13% / 32.16%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 16:43
Updated-05 Aug, 2025 | 14:41
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the access control list (ACL) processing on Pseudowire interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-8201-32fh-o8122-64ehf-oncs_540-12z20g-sys-a8011-4g24y4h-incs_540-fh-csr-sys8404ncs_57c1-48q6-sysncs_540x-16z8q2c-dios_xrncs_55a1-48q6h8111-32eh-oncs_5502-se8102-64hncs_5516ncs_540x-6z18g-sys-d8101-32h-oncs_5502ncs_55a2-mod-sncs_560-48212-48fh-mncs_55a1-36h-se8201-32fh8201ncs_540-28z4c-sys-dncs_540x-16z4g8q2c-d8608ncs_540-28z4c-sys-ancs_57d2-18dd-sys8202-32fh-mncs_55a2-mod-hd-s8501-sys-mt8700ncs_5508ncs_55a2-mod-se-s8101-32fh-oncs_540x-8z16g-sys-d8202ncs_55a1-24h8101-32fh8818ncs_540-6z14s-sys-dncs_540x-acc-sysncs_540x-6z18g-sys-a8804ncs_540x-8z16g-sys-ancs_560-78122-64eh-o8712-mod-mncs_57b1-6d24-sysncs_540x-16z4g8q2c-ancs_540x-12z16g-sys-dncs_540-6z18g-sys-ancs_540-24z8q2c-sysncs_57c3-mod-sysncs_540-12z20g-sys-dncs_540-fh-aggncs_540-24q2c2dd-sysncs_540x-12z16g-sys-ancs_540x-4z14g2q-dncs_55a1-36h8102-64h-oncs_55a1-24q6h-sncs_540-24q8l2dd-sys88128201-24h8fh8808ncs_55048711-32fh-mncs_540-acc-sysncs_540x-4z14g2q-ancs_5501-sencs_540-6z18g-sys-dncs_57b1-5dse-sysncs_5501ncs_55a1-24q6h-ss8102-28fh-dpu-oCisco IOS XR Softwareios_xr_software
CWE ID-CWE-284
Improper Access Control
CVE-2024-20291
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-12.18% / 93.66%
||
7 Day CHG~0.00%
Published-28 Feb, 2024 | 16:16
Updated-30 Apr, 2025 | 14:15
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device. This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_3524-xlnexus_9808nexus_9372px-enexus_93600cd-gxnexus_3000_in_standalone_nx-os_modenexus_9364d-gx2anexus_93108tc-exnexus_9316d-gxnexus_93108tc-fx3pnexus_93180yc-fx3hnexus_9000vnexus_3548-xnexus_93216tc-fx2nexus_3172tq-32tnexus_93360yc-fx2nexus_3172tq-xlnexus_92348gc-xnexus_93240yc-fx2nexus_3464cnexus_31108tc-vnexus_9332cnexus_9804nexus_31128pqnexus_9364c-gxnexus_34180ycnexus_3132q-xlnexus_9336pq_aci_spinenexus_9336c-fx2nexus_3548-xlnexus_93180yc-ex-24nexus_93180yc-exnexus_92300ycnexus_9348d-gx2anexus_9348gc-fxpnexus_3048nexus_9332pqnexus_3524-xnexus_3132c-znexus_9364c-h1nexus_3172tqnexus_3264qnexus_3264c-enexus_9348gc-fx3nexus_31108pc-vnx-osnexus_93108tc-ex-24nexus_9000_in_standalone_nx-os_modenexus_93180yc-fx-24nexus_9364e-sg2nexus_93180yc-fxnexus_9236cnexus_3432d-snexus_9372tx-enexus_3408-snexus_93180yc-fx3snexus_93180lc-exnexus_3164qnexus_9508nexus_9336c-fx2-enexus_3132q-vnexus_93120txnexus_9408nexus_9332d-gx2bnexus_93108tc-fxnexus_9396txnexus_93108tc-fx3nexus_9332d-h2rnexus_9364cnexus_92160yc-xnexus_3172pqnexus_93108tc-fx3hnexus_34200yc-smnexus_36180yc-rnexus_9272qnexus_3232cnexus_93108tc-fx-24nexus_3172pq-xlnexus_92348gc-fx3nexus_92304qcnexus_93180yc-fx3nexus_93400ld-h1Cisco NX-OS Softwarenx-os
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-863
Incorrect Authorization
CVE-2024-20315
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.05% / 14.74%
||
7 Day CHG~0.00%
Published-13 Mar, 2024 | 16:45
Updated-15 Apr, 2025 | 15:19
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the access control list (ACL) processing on MPLS interfaces in the ingress direction of Cisco IOS XR Software could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to improper assignment of lookup keys to internal interface contexts. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access resources behind the affected device that were supposed to be protected by a configured ACL.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco IOS XR Softwareios_xr_software
CWE ID-CWE-284
Improper Access Control
CVE-2024-20343
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.5||MEDIUM
EPSS-0.09% / 25.39%
||
7 Day CHG~0.00%
Published-11 Sep, 2024 | 16:38
Updated-12 Sep, 2024 | 12:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XR Software CLI Arbitrary File Read Vulnerability

A vulnerability in the CLI of Cisco IOS XR Software could allow an authenticated, local attacker to read any file in the file system of the underlying Linux operating system. The attacker must have valid credentials on the affected device. This vulnerability is due to incorrect validation of the arguments that are passed to a specific CLI command. An attacker could exploit this vulnerability by logging in to an affected device with low-privileged credentials and using the affected command. A successful exploit could allow the attacker access files in read-only mode on the Linux file system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco IOS XR Software
CWE ID-CWE-284
Improper Access Control
CVE-2024-20302
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.12% / 31.29%
||
7 Day CHG~0.00%
Published-03 Apr, 2024 | 16:21
Updated-11 Apr, 2025 | 15:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the tenant security implementation of Cisco Nexus Dashboard Orchestrator (NDO) could allow an authenticated, remote attacker to modify or delete tenant templates on an affected system. This vulnerability is due to improper access controls within tenant security. An attacker who is using a valid user account with write privileges and either a Site Manager or Tenant Manager role could exploit this vulnerability. A successful exploit could allow the attacker to modify or delete tenant templates under non-associated tenants, which could disrupt network traffic.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_dashboard_orchestratorCisco Nexus Dashboard Orchestrator
CWE ID-CWE-284
Improper Access Control
CVE-2024-20465
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.24% / 47.31%
||
7 Day CHG~0.00%
Published-25 Sep, 2024 | 16:29
Updated-24 Oct, 2024 | 19:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to the incorrect handling of IPv4 ACLs on switched virtual interfaces when an administrator enables and disables Resilient Ethernet Protocol (REP). An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iosIOSios
CWE ID-CWE-284
Improper Access Control
CVE-2024-20261
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.19% / 41.01%
||
7 Day CHG~0.00%
Published-22 May, 2024 | 16:53
Updated-30 Jul, 2025 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the file policy feature that is used to inspect encrypted archive files of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass a configured file policy to block an encrypted archive file. This vulnerability exists because of a logic error when a specific class of encrypted archive files is inspected. An attacker could exploit this vulnerability by sending a crafted, encrypted archive file through the affected device. A successful exploit could allow the attacker to send an encrypted archive file, which could contain malware and should have been blocked and dropped at the Cisco FTD device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseCisco Firepower Threat Defense Softwarefirepower_management_center
CWE ID-CWE-284
Improper Access Control
CVE-2024-20397
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.2||MEDIUM
EPSS-0.01% / 2.54%
||
7 Day CHG~0.00%
Published-04 Dec, 2024 | 16:13
Updated-08 Apr, 2025 | 14:29
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco NX-OS Software Image Verification Bypass Vulnerability

A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification.  This vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-Cisco NX-OS SoftwareCisco Unified Computing System (Managed)Cisco NX-OS System Software in ACI Mode
CWE ID-CWE-284
Improper Access Control
CVE-2024-20325
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.1||MEDIUM
EPSS-0.07% / 21.83%
||
7 Day CHG~0.00%
Published-21 Feb, 2024 | 16:09
Updated-06 May, 2025 | 17:43
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

A vulnerability in the Live Data server of Cisco Unified Intelligence Center could allow an unauthenticated, local attacker to read and modify data in a repository that belongs to an internal service on an affected device. This vulnerability is due to insufficient access control implementations on cluster configuration CLI requests. An attacker could exploit this vulnerability by sending a cluster configuration CLI request to specific directories on an affected device. A successful exploit could allow the attacker to read and modify data that is handled by an internal service on the affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-unified_intelligence_centerCisco Unified Intelligence Centerunified_intelligence_center
CWE ID-CWE-284
Improper Access Control
CVE-2014-2174
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8.3||HIGH
EPSS-0.21% / 43.76%
||
7 Day CHG~0.00%
Published-25 May, 2015 | 00:00
Updated-12 Apr, 2025 | 10:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Cisco TelePresence T, TelePresence TE, and TelePresence TC before 7.1 do not properly implement access control, which allows remote attackers to obtain root privileges by sending packets on the local network and allows physically proximate attackers to obtain root privileges via unspecified vectors, aka Bug ID CSCub67651.

Action-Not Available
Vendor-n/aCisco Systems, Inc.
Product-telepresence_tc_softwaretelepresence_te_softwaren/a
CWE ID-CWE-284
Improper Access Control
CVE-2020-3565
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.20% / 41.92%
||
7 Day CHG~0.00%
Published-21 Oct, 2020 | 18:40
Updated-13 Nov, 2024 | 17:46
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software TCP Intercept Bypass Vulnerability

A vulnerability in the TCP Intercept functionality of Cisco Firepower Threat Defense (FTD) Software could allow an unauthenticated, remote attacker to bypass configured Access Control Policies (including Geolocation) and Service Polices on an affected system. The vulnerability exists because TCP Intercept is invoked when the embryonic connection limit is reached, which can cause the underlying detection engine to process the packet incorrectly. An attacker could exploit this vulnerability by sending a crafted stream of traffic that matches a policy on which TCP Intercept is configured. A successful exploit could allow the attacker to match on an incorrect policy, which could allow the traffic to be forwarded when it should be dropped. In addition, the traffic could incorrectly be dropped.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2020-3126
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-3||LOW
EPSS-0.10% / 28.44%
||
7 Day CHG~0.00%
Published-13 Apr, 2020 | 16:40
Updated-15 Nov, 2024 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Meetings Multimedia Viewer Vulnerability

vulnerability within the Multimedia Viewer feature of Cisco Webex Meetings could allow an authenticated, remote attacker to bypass security protections. The vulnerability is due to missing security warning dialog boxes when a room host views shared multimedia files. An authenticated, remote attacker could exploit this vulnerability by using the host role to share files within the Multimedia sharing feature and convincing a former room host to view that file. A warning dialog normally appears cautioning users before the file is displayed; however, the former host would not see that warning dialog, and any shared multimedia would be rendered within the user's browser. The attacker could leverage this behavior to conduct additional attacks by including malicious files within a targeted room host's browser window.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_meetings_serverCisco Webex Meetings Multimedia Viewer
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-20
Improper Input Validation
CVE-2020-3482
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.5||MEDIUM
EPSS-0.20% / 41.57%
||
7 Day CHG~0.00%
Published-18 Nov, 2020 | 17:41
Updated-13 Nov, 2024 | 17:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Expressway Software Unauthorized Access Information Disclosure Vulnerability

A vulnerability in the Traversal Using Relays around NAT (TURN) server component of Cisco Expressway software could allow an unauthenticated, remote attacker to bypass security controls and send network traffic to restricted destinations. The vulnerability is due to improper validation of specific connection information by the TURN server within the affected software. An attacker could exploit this issue by sending specially crafted network traffic to the affected software. A successful exploit could allow the attacker to send traffic through the affected software to destinations beyond the application, possibly allowing the attacker to gain unauthorized network access.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-expresswaytelepresence_video_communication_serverCisco TelePresence Video Communication Server (VCS) Expressway
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-269
Improper Privilege Management
CVE-2020-3253
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-6.7||MEDIUM
EPSS-0.03% / 10.03%
||
7 Day CHG~0.00%
Published-06 May, 2020 | 16:41
Updated-15 Nov, 2024 | 17:24
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Firepower Threat Defense Software Shell Access Vulnerability

A vulnerability in the support tunnel feature of Cisco Firepower Threat Defense (FTD) Software could allow an authenticated, local attacker to access the shell of an affected device even though expert mode is disabled. The vulnerability is due to improper configuration of the support tunnel feature. An attacker could exploit this vulnerability by enabling the support tunnel, setting a key, and deriving the tunnel password. A successful exploit could allow the attacker to run any system command with root access on an affected device.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_threat_defenseCisco Firepower Threat Defense Software
CWE ID-CWE-284
Improper Access Control
CVE-2020-3245
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-0.21% / 43.25%
||
7 Day CHG~0.00%
Published-18 Jun, 2020 | 02:21
Updated-15 Nov, 2024 | 16:59
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Smart Software Manager On-Prem Improper Access Control Vulnerability

A vulnerability in the web application of Cisco Smart Software Manager On-Prem (SSM On-Prem) could allow an unauthenticated, remote attacker to create arbitrary user accounts. The vulnerability is due to the lack of authorization controls in the web application. An attacker could exploit this vulnerability by sending a crafted HTTP request to an affected device. A successful exploit could allow the attacker to add user accounts to the configuration of an affected device. These accounts would not be administrator or operator accounts.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-smart_software_manager_on-premCisco Smart Software Manager On-Prem
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-862
Missing Authorization
CVE-2020-26080
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.1||MEDIUM
EPSS-0.14% / 33.44%
||
7 Day CHG~0.00%
Published-18 Nov, 2020 | 17:40
Updated-13 Nov, 2024 | 17:39
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IoT Field Network Director Improper Domain Access Control Vulnerability

A vulnerability in the user management functionality of Cisco IoT Field Network Director (FND) could allow an authenticated, remote attacker to manage user information for users in different domains on an affected system. The vulnerability is due to improper domain access control. An attacker could exploit this vulnerability by manipulating JSON payloads to target different domains on an affected system. A successful exploit could allow the attacker to manage user information for users in different domains on an affected system.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-iot_field_network_directorCisco IoT Field Network Director (IoT-FND)
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-269
Improper Privilege Management
CVE-2019-1866
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-3.1||LOW
EPSS-0.12% / 31.80%
||
7 Day CHG~0.00%
Published-13 Apr, 2020 | 16:55
Updated-15 Nov, 2024 | 17:32
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Webex Business Suite Host Header Value Integrity Vulnerability

Cisco Webex Business Suite before 39.1.0 contains a vulnerability that could allow an unauthenticated, remote attacker to affect the integrity of the application. The vulnerability is due to improper validation of host header values. An attacker with a privileged network position, either a man-in-the-middle or by intercepting wireless network traffic, could exploit this vulnerability to manipulate header values sent by a client to the affected application. The attacker could cause the application to use input from the header to redirect a user from the Cisco Webex Meetings Online site to an arbitrary site of the attacker's choosing.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-webex_business_suite_39Cisco Webex Business Suite
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-345
Insufficient Verification of Data Authenticity
CVE-2019-1890
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.4||HIGH
EPSS-0.10% / 27.20%
||
7 Day CHG~0.00%
Published-04 Jul, 2019 | 20:00
Updated-21 Nov, 2024 | 19:20
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability

A vulnerability in the fabric infrastructure VLAN connection establishment of the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure VLAN. The vulnerability is due to insufficient security requirements during the Link Layer Discovery Protocol (LLDP) setup phase of the infrastructure VLAN. An attacker could exploit this vulnerability by sending a malicious LLDP packet on the adjacent subnet to the Cisco Nexus 9000 Series Switch in ACI mode. A successful exploit could allow the attacker to connect an unauthorized server to the infrastructure VLAN, which is highly privileged. With a connection to the infrastructure VLAN, the attacker can make unauthorized connections to Cisco Application Policy Infrastructure Controller (APIC) services or join other host endpoints.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-nexus_93108tc-exn9k-x97160yc-ex9736pqnexus_93120txapplication_policy_infrastructure_controllernexus_92160yc-xnexus_9316d-gxn9k-x9732c-fxnexus_93108tc-fxnexus_93360yc-fx2n9k-x9464tx2nexus_9332cnexus_9364cnexus_9336c-fx2x9636q-rnexus_9348gc-fxpn9k-x9788tc-fx9536pqn9k-x9732c-exn9k-x9564txnexus_93216tc-fx2n9k-x9464px9432pqnexus_93240yc-fx2nexus_93180yc-fx9636pqn9k-x9432c-snexus_93180yc-exnexus_93600cd-gxn9k-x9636c-rxn9k-x9736c-fxn9k-x9564pxn9k-x9636c-rn9k-x9736c-exCisco NX-OS System Software in ACI Mode 11.0.1b
CWE ID-CWE-284
Improper Access Control
CVE-2019-1690
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-4.3||MEDIUM
EPSS-0.11% / 28.81%
||
7 Day CHG~0.00%
Published-11 Mar, 2019 | 22:00
Updated-21 Nov, 2024 | 19:42
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Application Policy Infrastructure Controller IPv6 Link-Local Address Vulnerability

A vulnerability in the management interface of Cisco Application Policy Infrastructure Controller (APIC) software could allow an unauthenticated, adjacent attacker to gain unauthorized access on an affected device. The vulnerability is due to a lack of proper access control mechanisms for IPv6 link-local connectivity imposed on the management interface of an affected device. An attacker on the same physical network could exploit this vulnerability by attempting to connect to the IPv6 link-local address on the affected device. A successful exploit could allow the attacker to bypass default access control restrictions on an affected device. Cisco Application Policy Infrastructure Controller (APIC) devices running versions prior to 4.2(0.21c) are affected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-firepower_9300nexus_93180lc-exfirepower_4150nexus_56128pnexus_9332pqnexus_3172tqnexus_93108tc-exnexus_3636c-rnexus_9508firepower_2130nexus_93120txapplication_policy_infrastructure_controllerfirepower_4110nexus_93128txnexus_9336pq_aci_spineucs_6400firepower_2110firepower_4145nexus_3548-xlnexus_31128pqnexus_3132q-vnexus_9332cnexus_9364cnexus_3164qnexus_92348gc-xnexus_3172tq-32tnexus_5020nexus_9336c-fx2nexus_3524-xnexus_3132c-znexus_31108tc-vnexus_5548pnexus_9348gc-fxpnexus_5648qnexus_3172nexus_9272qnexus_3464cnexus_93216tc-fx2nexus_36180yc-rnexus_5672upnexus_93180yc-fxnexus_3264qfirepower_4140nexus_3432d-snexus_34180ycnexus_9000vmds_9509nexus_31108pc-vnexus_5596upfirepower_4115nexus_3524nexus_3548nexus_3132qnexus_3016nexus_9372pxnexus_5696qnexus_92304qcnexus_92160yc-xucs_6248upfirepower_4125mds_9100nexus_9504nexus_3048nexus_9372tx-enexus_93108tc-fxnexus_93360yc-fx2nexus_3524-xlucs_6324nexus_9396txfirepower_4120nexus_7000nexus_92300ycnexus_3064ucs_6332nexus_3232cnexus_5548upnexus_9396pxfirepower_2120ucs_6296upnexus_5010nexus_5596tnexus_3264c-enexus_93240yc-fx2nexus_9372txnexus_5624qnexus_3548-xfirepower_4112nexus_3132q-xlnexus_3064-tfirepower_2140mds_9710nexus_3172tq-xlnexus_3408-snexus_93180yc-exnexus_9372px-enexus_9236cnexus_9516mds_9134nexus_3172pq-xlnexus_7700Cisco Application Policy Infrastructure Controller (APIC)
CWE ID-CWE-284
Improper Access Control
CVE-2019-1759
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-28.48% / 96.41%
||
7 Day CHG~0.00%
Published-28 Mar, 2019 | 00:25
Updated-19 Nov, 2024 | 19:12
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IOS XE Software Gigabit Ethernet Management Interface Access Control List Bypass Vulnerability

A vulnerability in access control list (ACL) functionality of the Gigabit Ethernet Management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to reach the configured IP addresses on the Gigabit Ethernet Management interface. The vulnerability is due to a logic error that was introduced in the Cisco IOS XE Software 16.1.1 Release, which prevents the ACL from working when applied against the management interface. An attacker could exploit this issue by attempting to access the device via the management interface.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ios_xeCisco IOS XE Software
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2019-1666
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-1.59% / 81.33%
||
7 Day CHG~0.00%
Published-21 Feb, 2019 | 19:00
Updated-19 Nov, 2024 | 19:16
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco HyperFlex Unauthenticated Statistics Retrieval Vulnerability

A vulnerability in the Graphite service of Cisco HyperFlex software could allow an unauthenticated, remote attacker to retrieve data from the Graphite service. The vulnerability is due to insufficient authentication controls. An attacker could exploit this vulnerability by sending crafted requests to the Graphite service. A successful exploit could allow the attacker to retrieve any statistics from the Graphite service. Versions prior to 3.5(2a) are affected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-hyperflex_hx_data_platformCisco HyperFlex HX-Series
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-287
Improper Authentication
CVE-2019-1660
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.3||MEDIUM
EPSS-1.59% / 81.33%
||
7 Day CHG~0.00%
Published-07 Feb, 2019 | 22:00
Updated-19 Nov, 2024 | 19:17
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco TelePresence Management Suite Simple Object Access Protocol Vulnerability

A vulnerability in the Simple Object Access Protocol (SOAP) of Cisco TelePresence Management Suite (TMS) software could allow an unauthenticated, remote attacker to gain unauthorized access to an affected device. The vulnerability is due to a lack of proper access and authentication controls on the affected TMS software. An attacker could exploit this vulnerability by gaining access to internal, trusted networks to send crafted SOAP calls to the affected device. If successful, an exploit could allow the attacker to access system management tools. Under normal circumstances, this access should be prohibited.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-telepresence_management_suiteCisco TelePresence Management Suite (TMS)
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-264
Not Available
CVE-2019-1805
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-0.09% / 26.15%
||
7 Day CHG~0.00%
Published-18 Apr, 2019 | 01:10
Updated-21 Nov, 2024 | 19:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Wireless LAN Controller Secure Shell Unauthorized Access Vulnerability

A vulnerability in certain access control mechanisms for the Secure Shell (SSH) server implementation for Cisco Wireless LAN Controller (WLC) Software could allow an unauthenticated, adjacent attacker to access a CLI instance on an affected device. The vulnerability is due to a lack of proper input- and validation-checking mechanisms for inbound SSH connections on an affected device. An attacker could exploit this vulnerability by attempting to establish an SSH connection to an affected controller. An exploit could allow the attacker to access an affected device's CLI to potentially cause further attacks. This vulnerability has been fixed in version 8.5(140.0).

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-wireless_lan_controller_softwareCisco Wireless LAN Controller (WLC)
CWE ID-CWE-284
Improper Access Control
CWE ID-CWE-20
Improper Input Validation
CVE-2019-1763
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-7.5||HIGH
EPSS-1.13% / 77.98%
||
7 Day CHG~0.00%
Published-22 Mar, 2019 | 20:05
Updated-19 Nov, 2024 | 19:14
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco IP Phone 8800 Series Authorization Bypass Vulnerability

A vulnerability in the web-based management interface of Session Initiation Protocol (SIP) Software for Cisco IP Phone 8800 Series could allow an unauthenticated, remote attacker to bypass authorization, access critical services, and cause a denial of service (DoS) condition. The vulnerability exists because the software fails to sanitize URLs before it handles requests. An attacker could exploit this vulnerability by submitting a crafted URL. A successful exploit could allow the attacker to gain unauthorized access to critical services and cause a DoS condition. This vulnerability affects Cisco IP Phone 8800 Series products running a SIP Software release prior to 11.0(5) for Wireless IP Phone 8821 and 8821-EX; and 12.5(1)SR1 for the IP Conference Phone 8832 and the rest of the IP Phone 8800 Series. Cisco IP Conference Phone 8831 is not affected.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-ip_phone_8821-ex_firmwareip_phone_8821ip_conference_phone_8832_firmwareip_phone_8800ip_conference_phone_8832ip_phone_8821_firmwareip_phone_8821-exip_phone_8800_firmwareCisco Wireless IP Phone 8821 and 8821-EXCisco IP Conference Phone 8832 and the rest of the IP Phone 8800 Series
CWE ID-CWE-284
Improper Access Control
CVE-2019-1686
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.8||MEDIUM
EPSS-0.19% / 40.79%
||
7 Day CHG~0.00%
Published-17 Apr, 2019 | 21:50
Updated-19 Nov, 2024 | 19:11
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco ASR 9000 Series Aggregation Services Routers ACL Bypass Vulnerability

A vulnerability in the TCP flags inspection feature for access control lists (ACLs) on Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device. The vulnerability is due to incorrect processing of the ACL applied to an interface of an affected device when Cisco Express Forwarding load balancing using the 3-tuple hash algorithm is enabled. An attacker could exploit this vulnerability by sending traffic through an affected device that should otherwise be denied by the configured ACL. An exploit could allow the attacker to bypass protection offered by a configured ACL on the affected device. There are workarounds that address this vulnerability. Affected Cisco IOS XR versions are: Cisco IOS XR Software Release 5.1.1 and later till first fixed. First Fixed Releases: 6.5.2 and later, 6.6.1 and later.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-asr_9000vasr_9910asr_9906asr_9904asr_9006asr_9912asr_9922asr_9010asr_9001ios_xrasr_9901Cisco IOS XR Software
CWE ID-CWE-284
Improper Access Control
CVE-2019-15999
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-5.4||MEDIUM
EPSS-3.16% / 86.62%
||
7 Day CHG~0.00%
Published-06 Jan, 2020 | 07:45
Updated-15 Nov, 2024 | 17:52
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco Data Center Network Manager JBoss EAP Unauthorized Access Vulnerability

A vulnerability in the application environment of Cisco Data Center Network Manager (DCNM) could allow an authenticated, remote attacker to gain unauthorized access to the JBoss Enterprise Application Platform (JBoss EAP) on an affected device. The vulnerability is due to an incorrect configuration of the authentication settings on the JBoss EAP. An attacker could exploit this vulnerability by authenticating with a specific low-privilege account. A successful exploit could allow the attacker to gain unauthorized access to the JBoss EAP, which should be limited to internal system accounts.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-data_center_network_managerCisco Data Center Network Manager
CWE ID-CWE-284
Improper Access Control
CVE-2019-1647
Matching Score-6
Assigner-Cisco Systems, Inc.
ShareView Details
Matching Score-6
Assigner-Cisco Systems, Inc.
CVSS Score-8||HIGH
EPSS-0.85% / 74.54%
||
7 Day CHG~0.00%
Published-24 Jan, 2019 | 15:00
Updated-20 Nov, 2024 | 17:28
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Cisco SD-WAN Solution Unauthorized Access Vulnerability

A vulnerability in the Cisco SD-WAN Solution could allow an authenticated, adjacent attacker to bypass authentication and have direct unauthorized access to other vSmart containers. The vulnerability is due to an insecure default configuration of the affected system. An attacker could exploit this vulnerability by directly connecting to the exposed services. An exploit could allow the attacker to retrieve and modify critical system files.

Action-Not Available
Vendor-Cisco Systems, Inc.
Product-vsmart_controllersd-wanCisco SD-WAN Solution
CWE ID-CWE-284
Improper Access Control
  • Previous
  • 1
  • 2
  • 3
  • 4
  • Next
Details not found