CVE-2017-3875
Published Mar 17, 2017
Last updated 7 years ago
Overview
- Description
- An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:nx-os:5.2\\(4\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "356B4143-5184-491B-9D10-19D6536366CD" }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(3\\)s5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3D98CD1-AE44-4863-9B9B-8B16746E122C" }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.1\\(3\\)s6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3357A3F-C304-4D73-8E0A-74DC3B54913D" }, { "criteria": "cpe:2.3:o:cisco:nx-os:6.2\\(1.121\\)s0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "710C34E7-0FCF-4182-9514-8E05C7273EFE" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.2\\(1\\)d1\\(1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C18A0045-87F3-4782-81C5-0BF615EA9346" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(0\\)zn\\(0.161\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9D32F3A3-C0C6-44FE-8047-C2751BC0124B" }, { "criteria": "cpe:2.3:o:cisco:nx-os:7.3\\(1\\)n1\\(0.1\\):*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD92EECB-28FD-436C-98E6-488554EDFB18" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "B22B3865-30E9-4B5A-A37D-DC33F1150FFE" }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "459A7F11-52BF-4AD6-B495-4C4D6C050493" }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FEACA55F-4335-4478-B608-EB92EE1D6C6D" }, { "criteria": "cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DB73543E-9B5B-4BA9-8FB4-666AF5AC8B6B" }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E5ABB175-81BE-4C46-BD2D-70016508BE22" }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "71F93299-A715-4E97-87FE-B1E248EA98BD" }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3D71B228-FFE5-45F7-ADCF-6D359ADA6D31" }, { "criteria": "cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9F3AD807-5A0F-4DF5-9A7A-748205F409E7" } ], "operator": "OR" } ], "operator": "AND" } ]