Overview
- Description
- A vulnerability in the access control list (ACL) programming of Cisco Nexus 3550-F Switches could allow an unauthenticated, remote attacker to send traffic that should be blocked to the management interface of an affected device. This vulnerability exists because ACL deny rules are not properly enforced at the time of device reboot. An attacker could exploit this vulnerability by attempting to send traffic to the management interface of an affected device. A successful exploit could allow the attacker to send traffic to the management interface of the affected device.
- Source
- ykramarz@cisco.com
- NVD status
- Awaiting Analysis
Risk scores
CVSS 3.1
- Type
- Secondary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
- Severity
- MEDIUM
Weaknesses
- ykramarz@cisco.com
- CWE-264
Social media
- Hype score
- Not currently trending
CVE-2024-20371 Remote ACL Bypass on Cisco Nexus 3550-F Switches A problem in the access control list (ACL) setup of Cisco Nexus 3550-F Switches can let an unauthenticated remote attacker send traffic that should ... https://t.co/onmighrmkp
@VulmonFeeds
7 Nov 2024
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-20371 A vulnerability in the access control list (ACL) programming of Cisco Nexus 3550-F Switches could allow an unauthenticated, remote attacker to send traffic that shoul… https://t.co/GPvPe8Os9g
@CVEnew
6 Nov 2024
506 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes