Unknown
CVE-2021-1387
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-1387
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the network stack of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability exists because the software improperly releases resources when it processes certain IPv6 packets that are destined to an affected device. An attacker could exploit this vulnerability by sending multiple crafted IPv6 packets to an affected device. A successful exploit could cause the network stack to run out of available buffers, impairing operations of control plane and management plane protocols and resulting in a DoS condition. Manual intervention would be required to restore normal operations on the affected device. For more information about the impact of this vulnerability, see the Details section of this advisory.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- cisco
Products
- nx-os 6.0(2)a3(1),
- nx-os 6.0(2)a3(2),
- nx-os 6.0(2)a3(4),
- nx-os 6.0(2)a4(1),
- nx-os 6.0(2)a4(2),
- nx-os 6.0(2)a4(3),
- nx-os 6.0(2)a4(4),
- nx-os 6.0(2)a4(5),
- nx-os 6.0(2)a4(6),
- nx-os 6.0(2)a6(1),
- nx-os 6.0(2)a6(1a),
- nx-os 6.0(2)a6(2),
- nx-os 6.0(2)a6(2a),
- nx-os 6.0(2)a6(3),
- nx-os 6.0(2)a6(3a),
- nx-os 6.0(2)a6(4),
- nx-os 6.0(2)a6(4a),
- nx-os 6.0(2)a6(5),
- nx-os 6.0(2)a6(5a),
- nx-os 6.0(2)a6(5b),
- nx-os 6.0(2)a6(6),
- nx-os 6.0(2)a6(7),
- nx-os 6.0(2)a6(8),
- nx-os 6.0(2)a7(1),
- nx-os 6.0(2)a7(1a),
- nx-os 6.0(2)a7(2),
- nx-os 6.0(2)a7(2a),
- nx-os 6.0(2)a8(1),
- nx-os 6.0(2)a8(10),
- nx-os 6.0(2)a8(10a),
- nx-os 6.0(2)a8(11),
- nx-os 6.0(2)a8(11a),
- nx-os 6.0(2)a8(11b),
- nx-os 6.0(2)a8(2),
- nx-os 6.0(2)a8(3),
- nx-os 6.0(2)a8(4),
- nx-os 6.0(2)a8(4a),
- nx-os 6.0(2)a8(5),
- nx-os 6.0(2)a8(6),
- nx-os 6.0(2)a8(7),
- nx-os 6.0(2)a8(7a),
- nx-os 6.0(2)a8(7b),
- nx-os 6.0(2)a8(8),
- nx-os 6.0(2)a8(9),
- nx-os 6.0(2)u2(1),
- nx-os 6.0(2)u2(2),
- nx-os 6.0(2)u2(3),
- nx-os 6.0(2)u2(4),
- nx-os 6.0(2)u2(5),
- nx-os 6.0(2)u2(6),
- nx-os 6.0(2)u3(1),
- nx-os 6.0(2)u3(2),
- nx-os 6.0(2)u3(3),
- nx-os 6.0(2)u3(4),
- nx-os 6.0(2)u3(5),
- nx-os 6.0(2)u3(6),
- nx-os 6.0(2)u3(7),
- nx-os 6.0(2)u3(8),
- nx-os 6.0(2)u3(9),
- nx-os 6.0(2)u4(1),
- nx-os 6.0(2)u4(2),
- nx-os 6.0(2)u4(3),
- nx-os 6.0(2)u4(4),
- nx-os 6.0(2)u5(1),
- nx-os 6.0(2)u5(2),
- nx-os 6.0(2)u5(3),
- nx-os 6.0(2)u5(4),
- nx-os 6.0(2)u6(1),
- nx-os 6.0(2)u6(10),
- nx-os 6.0(2)u6(10a),
- nx-os 6.0(2)u6(1a),
- nx-os 6.0(2)u6(2),
- nx-os 6.0(2)u6(2a),
- nx-os 6.0(2)u6(3),
- nx-os 6.0(2)u6(3a),
- nx-os 6.0(2)u6(4),
- nx-os 6.0(2)u6(4a),
- nx-os 6.0(2)u6(5),
- nx-os 6.0(2)u6(5a),
- nx-os 6.0(2)u6(5b),
- nx-os 6.0(2)u6(5c),
- nx-os 6.0(2)u6(6),
- nx-os 6.0(2)u6(7),
- nx-os 6.0(2)u6(8),
- nx-os 6.0(2)u6(9),
- nx-os 7.0(0)n1(1),
- nx-os 7.0(1)n1(1),
- nx-os 7.0(2)n1(1),
- nx-os 7.0(3)f1(1),
- nx-os 7.0(3)f2(1),
- nx-os 7.0(3)f2(2),
- nx-os 7.0(3)f3(1),
- nx-os 7.0(3)f3(2),
- nx-os 7.0(3)f3(3),
- nx-os 7.0(3)f3(3a),
- nx-os 7.0(3)f3(3c),
- nx-os 7.0(3)f3(4),
- nx-os 7.0(3)f3(5),
- nx-os 7.0(3)i2(1),
- nx-os 7.0(3)i2(1a),
- nx-os 7.0(3)i2(2),
- nx-os 7.0(3)i2(2a),
- nx-os 7.0(3)i2(2b),
- nx-os 7.0(3)i2(2c),
- nx-os 7.0(3)i2(2d),
- nx-os 7.0(3)i2(2e),
- nx-os 7.0(3)i2(2r),
- nx-os 7.0(3)i2(2s),
- nx-os 7.0(3)i2(2v),
- nx-os 7.0(3)i2(2w),
- nx-os 7.0(3)i2(2x),
- nx-os 7.0(3)i2(2y),
- nx-os 7.0(3)i2(3),
- nx-os 7.0(3)i2(4),
- nx-os 7.0(3)i2(5),
- nx-os 7.0(3)i3(1),
- nx-os 7.0(3)i4(1),
- nx-os 7.0(3)i4(1t),
- nx-os 7.0(3)i4(2),
- nx-os 7.0(3)i4(3),
- nx-os 7.0(3)i4(4),
- nx-os 7.0(3)i4(5),
- nx-os 7.0(3)i4(6),
- nx-os 7.0(3)i4(6t),
- nx-os 7.0(3)i4(7),
- nx-os 7.0(3)i4(8),
- nx-os 7.0(3)i4(8a),
- nx-os 7.0(3)i4(8b),
- nx-os 7.0(3)i4(8z),
- nx-os 7.0(3)i4(9),
- nx-os 7.0(3)i5(1),
- nx-os 7.0(3)i5(2),
- nx-os 7.0(3)i5(3),
- nx-os 7.0(3)i5(3a),
- nx-os 7.0(3)i5(3b),
- nx-os 7.0(3)i6(1),
- nx-os 7.0(3)i6(2),
- nx-os 7.0(3)i7(1),
- nx-os 7.0(3)i7(2),
- nx-os 7.0(3)i7(3),
- nx-os 7.0(3)i7(3z),
- nx-os 7.0(3)i7(4),
- nx-os 7.0(3)i7(5),
- nx-os 7.0(3)i7(5a),
- nx-os 7.0(3)i7(6),
- nx-os 7.0(3)i7(6z),
- nx-os 7.0(3)i7(7),
- nx-os 7.0(3)i7(8),
- nx-os 7.0(3)ia7(1),
- nx-os 7.0(3)ia7(2),
- nx-os 7.0(3)ic4(4),
- nx-os 7.0(3)im3(1),
- nx-os 7.0(3)im3(2),
- nx-os 7.0(3)im3(2a),
- nx-os 7.0(3)im3(2b),
- nx-os 7.0(3)im3(3),
- nx-os 7.0(3)im7(2),
- nx-os 7.0(3)n1(1),
- nx-os 7.0(4)n1(1),
- nx-os 7.0(4)n1(1a),
- nx-os 7.0(5)n1(1),
- nx-os 7.0(5)n1(1a),
- nx-os 7.0(6)n1(1),
- nx-os 7.0(6)n1(2s),
- nx-os 7.0(6)n1(3s),
- nx-os 7.0(6)n1(4s),
- nx-os 7.0(7)n1(1),
- nx-os 7.0(7)n1(1a),
- nx-os 7.0(7)n1(1b),
- nx-os 7.0(8)n1(1),
- nx-os 7.0(8)n1(1a),
- nx-os 7.1(0)n1(1),
- nx-os 7.1(0)n1(1a),
- nx-os 7.1(0)n1(1b),
- nx-os 7.1(1)n1(1),
- nx-os 7.1(1)n1(1a),
- nx-os 7.1(2)n1(1),
- nx-os 7.1(2)n1(1a),
- nx-os 7.1(3)n1(1),
- nx-os 7.1(3)n1(2),
- nx-os 7.1(3)n1(2a),
- nx-os 7.1(3)n1(3),
- nx-os 7.1(3)n1(4),
- nx-os 7.1(3)n1(5),
- nx-os 7.1(4)n1(1),
- nx-os 7.1(4)n1(1a),
- nx-os 7.1(4)n1(1c),
- nx-os 7.1(4)n1(1d),
- nx-os 7.1(5)n1(1),
- nx-os 7.1(5)n1(1b),
- nx-os 7.2(0)d1(1),
- nx-os 7.2(0)n1(1),
- nx-os 7.2(1)d1(1),
- nx-os 7.2(1)n1(1),
- nx-os 7.2(2)d1(1),
- nx-os 7.2(2)d1(2),
- nx-os 7.2(2)d1(3),
- nx-os 7.2(2)d1(4),
- nx-os 7.3(0)d1(1),
- nx-os 7.3(0)dx(1),
- nx-os 7.3(0)n1(1),
- nx-os 7.3(0)n1(1a),
- nx-os 7.3(0)n1(1b),
- nx-os 7.3(1)d1(1),
- nx-os 7.3(1)n1(1),
- nx-os 7.3(2)d1(1),
- nx-os 7.3(2)d1(1d),
- nx-os 7.3(2)d1(2),
- nx-os 7.3(2)d1(3),
- nx-os 7.3(2)d1(3a),
- nx-os 7.3(2)n1(1),
- nx-os 7.3(2)n1(1b),
- nx-os 7.3(2)n1(1c),
- nx-os 7.3(3)d1(1),
- nx-os 7.3(3)n1(1),
- nx-os 7.3(4)d1(1),
- nx-os 7.3(4)n1(1),
- nx-os 7.3(4)n1(1a),
- nx-os 7.3(5)d1(1),
- nx-os 7.3(5)n1(1),
- nx-os 7.3(6)d1(1),
- nx-os 7.3(6)n1(1),
- nx-os 7.3(6)n1(1a),
- nx-os 7.3(7)n1(1),
- nx-os 7.3(7)n1(1a),
- nx-os 7.3(7)n1(1b),
- nx-os 8.0(1),
- nx-os 8.1(1),
- nx-os 8.1(2),
- nx-os 8.1(2a),
- nx-os 8.2(1),
- nx-os 8.2(2),
- nx-os 8.2(3),
- nx-os 8.2(4),
- nx-os 8.2(5),
- nx-os 8.3(1),
- nx-os 8.3(2),
- nx-os 8.4(1),
- nx-os 8.4(2),
- unified computing system
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: