CVE-2017-3875

An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:nx-os:5.2\(4\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.1\(3\)s5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.1\(3\)s6:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:6.2\(1.121\)s0:*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:7.2\(1\)d1\(1\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:7.3\(0\)zn\(0.161\):*:*:*:*:*:*:*
cpe:2.3:o:cisco:nx-os:7.3\(1\)n1\(0.1\):*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*

History

21 Nov 2024, 03:26

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/96930 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/96930 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1038049 - () http://www.securitytracker.com/id/1038049 -
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170315-cns - Vendor Advisory

Information

Published : 2017-03-17 22:59

Updated : 2024-11-21 03:26


NVD link : CVE-2017-3875

Mitre link : CVE-2017-3875

CVE.ORG link : CVE-2017-3875


JSON object : View

Products Affected

cisco

  • nexus_7700_18-slot
  • nexus_7000_9-slot
  • nexus_7700_6-slot
  • nx-os
  • nexus_7700_10-slot
  • nexus_7000_4-slot
  • nexus_7700_2-slot
  • nexus_7000_18-slot
  • nexus_7000_10-slot
CWE
CWE-20

Improper Input Validation