CVE-2021-1266

A vulnerability in the REST API of Cisco Managed Services Accelerator (MSX) could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the way that the affected software logs certain API requests. An attacker could exploit this vulnerability by sending a flood of crafted API requests to an affected device. A successful exploit could allow the attacker to cause a DoS condition on the affected device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:managed_services_accelerator:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:43

Type Values Removed Values Added
CVSS v2 : 6.8
v3 : 6.5
v2 : 6.8
v3 : 4.3
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-msx-dos-4j7sytvU - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-msx-dos-4j7sytvU - Vendor Advisory

Information

Published : 2021-02-04 17:15

Updated : 2024-11-21 05:43


NVD link : CVE-2021-1266

Mitre link : CVE-2021-1266

CVE.ORG link : CVE-2021-1266


JSON object : View

Products Affected

cisco

  • managed_services_accelerator
CWE
CWE-400

Uncontrolled Resource Consumption