A vulnerability in the Rate Limiting Network Address Translation (NAT) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization in the Cisco QuantumFlow Processor of an affected device, resulting in a denial of service (DoS) condition. This vulnerability is due to mishandling of the rate limiting feature within the QuantumFlow Processor. An attacker could exploit this vulnerability by sending large amounts of traffic that would be subject to NAT and rate limiting through an affected device. A successful exploit could allow the attacker to cause the QuantumFlow Processor utilization to reach 100 percent on the affected device, resulting in a DoS condition.
References
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 05:44
Type | Values Removed | Values Added |
---|---|---|
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ratenat-pYVLA7wM - Vendor Advisory |
30 Jun 2023, 17:09
Type | Values Removed | Values Added |
---|---|---|
CWE | NVD-CWE-Other |
Information
Published : 2021-09-23 03:15
Updated : 2024-11-21 05:44
NVD link : CVE-2021-1624
Mitre link : CVE-2021-1624
CVE.ORG link : CVE-2021-1624
JSON object : View
Products Affected
cisco
- asr_1001-hx
- asr_1002-x_r
- asr_1001-x_r
- asr_1000
- asr_1009-x
- asr_1000-x
- asr_1000-esp100
- ios_xe
- asr_1002-hx
- asr_1006
- asr_1001
- asr_1002-x
- asr_1002-hx_r
- asr_1001-hx_r
- asr_1004
- asr_1001-x
- asr_1013
- asr_1002
- asr_1006-x
- asr_1023
CWE