CVE-2021-1389Improper Access Control in Cisco IOS XR

Severity
6.5MEDIUMNVD
CNA5.8
EPSS
0.4%
top 40.36%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 4
Latest updateMay 24

Description

A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A success

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:NExploitability: 3.9 | Impact: 2.5

Affected Packages2 packages

NVDcisco/ios_xr< 6.6.3+2

🔴Vulnerability Details

2
GHSA
GHSA-r95g-ccc3-r2m4: A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthentica2022-05-24
CVEList
Cisco IOS XR and Cisco NX-OS Software IPv6 Access Control List Bypass Vulnerability2021-02-04

📋Vendor Advisories

1
Cisco
Cisco IOS XR and Cisco NX-OS Software IPv6 Access Control List Bypass Vulnerability2021-02-03
CVE-2021-1389 — Improper Access Control in Cisco IOS XR | cvebase