CVE-2021-1587Misinterpretation of Input in Cisco Nx-os Software

Severity
8.6HIGHNVD
EPSS
0.6%
top 31.20%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedAug 25
Latest updateMay 24

Description

A vulnerability in the VXLAN Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software, known as NGOAM, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific packets with a Transparent Interconnection of Lots of Links (TRILL) OAM EtherType. An attacker could exploit this vulnerability by sending crafted packets, including the TRILL OAM EtherType of 0x890

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 3.9 | Impact: 4.0

Affected Packages1 packages

Patches

🔴Vulnerability Details

2
GHSA
GHSA-q6hr-vm49-fvm5: A vulnerability in the VXLAN Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software, known as NGOAM, could allow an unauthen2022-05-24
CVEList
Cisco NX-OS Software VXLAN OAM (NGOAM) Denial of Service Vulnerability2021-08-25

📋Vendor Advisories

1
Cisco
Cisco NX-OS Software VXLAN OAM (NGOAM) Denial of Service Vulnerability2021-08-25
CVE-2021-1587 — Misinterpretation of Input in Cisco | cvebase