Unknown
CVE-2021-34767
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)CVE-2021-34767
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in IPv6 traffic processing of Cisco IOS XE Wireless Controller Software for Cisco Catalyst 9000 Family Wireless Controllers could allow an unauthenticated, adjacent attacker to cause a Layer 2 (L2) loop in a configured VLAN, resulting in a denial of service (DoS) condition for that VLAN. The vulnerability is due to a logic error when processing specific link-local IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet that would flow inbound through the wired interface of an affected device. A successful exploit could allow the attacker to cause traffic drops in the affected VLAN, thus triggering the DoS condition.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- cisco
Products
- ios xe,
- ios xe 16.10.1,
- ios xe 16.10.1a,
- ios xe 16.10.1b,
- ios xe 16.10.1c,
- ios xe 16.10.1d,
- ios xe 16.10.1e,
- ios xe 16.10.1f,
- ios xe 16.10.1g,
- ios xe 16.10.1s,
- ios xe 16.10.2,
- ios xe 16.10.3,
- ios xe 16.11.1,
- ios xe 16.11.1a,
- ios xe 16.11.1b,
- ios xe 16.11.1c,
- ios xe 16.11.1s,
- ios xe 16.11.2,
- ios xe 16.12.1,
- ios xe 16.12.1a,
- ios xe 16.12.1c,
- ios xe 16.12.1s,
- ios xe 16.12.1t,
- ios xe 16.12.1w,
- ios xe 16.12.1x,
- ios xe 16.12.1y,
- ios xe 16.12.1z,
- ios xe 16.12.1z1,
- ios xe 16.12.1za,
- ios xe 16.12.2,
- ios xe 16.12.2a,
- ios xe 16.12.2s,
- ios xe 16.12.2t,
- ios xe 16.12.3,
- ios xe 16.12.3a,
- ios xe 16.12.3s,
- ios xe 16.12.4,
- ios xe 16.12.4a,
- ios xe 16.7.1,
- ios xe 16.7.1a,
- ios xe 16.7.1b,
- ios xe 16.7.2,
- ios xe 16.7.3,
- ios xe 16.7.4,
- ios xe 16.8.1,
- ios xe 16.8.1a,
- ios xe 16.8.1b,
- ios xe 16.8.1c,
- ios xe 16.8.1d,
- ios xe 16.8.1e,
- ios xe 16.8.1s,
- ios xe 16.8.2,
- ios xe 16.8.3,
- ios xe 16.9.1,
- ios xe 16.9.1a,
- ios xe 16.9.1b,
- ios xe 16.9.1c,
- ios xe 16.9.1d,
- ios xe 16.9.1s,
- ios xe 16.9.2,
- ios xe 16.9.2a,
- ios xe 16.9.2s,
- ios xe 16.9.3,
- ios xe 16.9.3a,
- ios xe 16.9.3h,
- ios xe 16.9.3s,
- ios xe 16.9.4,
- ios xe 16.9.4c,
- ios xe 16.9.5,
- ios xe 16.9.5f,
- ios xe 16.9.6,
- ios xe 16.9.7,
- ios xe 17.1.1,
- ios xe 17.1.1a,
- ios xe 17.1.1s,
- ios xe 17.1.1t,
- ios xe 17.1.2,
- ios xe 17.1.3,
- ios xe 17.2.1,
- ios xe 17.2.1a,
- ios xe 17.2.1r,
- ios xe 17.2.1v,
- ios xe 17.2.2,
- ios xe 17.2.3,
- ios xe 17.3.1,
- ios xe 17.3.1a,
- ios xe 17.3.1w,
- ios xe 17.3.1x,
- ios xe 17.3.1z,
- ios xe 17.3.2,
- ios xe 17.3.2a,
- ios xe 3.15.1xbs,
- ios xe 3.15.2xbs
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: