CVE-2011-2581

The ACL implementation in Cisco NX-OS 5.0(2) and 5.0(3) before 5.0(3)N2(1) on Nexus 5000 series switches, and NX-OS before 5.0(3)U1(2a) on Nexus 3000 series switches, does not properly handle comments in conjunction with deny statements, which allows remote attackers to bypass intended access restrictions in opportunistic circumstances by sending packets, aka Bug IDs CSCto09813 and CSCtr61490.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:a:cisco:nx-os:5.0\(2\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:nx-os:5.0\(3\)n1\(1\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:nx-os:5.0\(3\)n1\(1a\):*:*:*:*:*:*:*
cpe:2.3:a:cisco:nx-os:5.0\(3\)n1\(1b\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:5.0\(3\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:5.0\(3\)n1\(1c\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_5000:*:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:5.0\(3\)u1\(1a\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:5.0\(3\)u1\(1b\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:5.0\(3\)u1\(1d\):*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_3000:*:*:*:*:*:*:*:*

History

21 Nov 2024, 01:28

Type Values Removed Values Added
References () http://secunia.com/advisories/45883 - () http://secunia.com/advisories/45883 -
References () http://www.cisco.com/en/US/products/products_security_advisory09186a0080b9250c.shtml - Vendor Advisory () http://www.cisco.com/en/US/products/products_security_advisory09186a0080b9250c.shtml - Vendor Advisory
References () http://www.securitytracker.com/id?1026019 - () http://www.securitytracker.com/id?1026019 -

Information

Published : 2011-09-14 16:05

Updated : 2024-11-21 01:28


NVD link : CVE-2011-2581

Mitre link : CVE-2011-2581

CVE.ORG link : CVE-2011-2581


JSON object : View

Products Affected

cisco

  • nexus_5000
  • nx-os
  • nexus_3000
CWE
CWE-264

Permissions, Privileges, and Access Controls