Severity
5.8MEDIUM
EPSS
14.0%
top 5.65%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 29

Description

A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device. This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:NExploitability: 3.9 | Impact: 1.4

Affected Packages2 packages

NVDcisco/nx-os9.3\(10\), 9.3\(11\), 9.3\(12\)+2
CVEListV5cisco/cisco_nx-os_software9.3(10), 9.3(11), 9.3(12)+2

🔴Vulnerability Details

2
GHSA
GHSA-wwgf-8wgf-pm54: A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone2024-02-29
CVEList
CVE-2024-20291: A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone2024-02-28

📋Vendor Advisories

1
Cisco
Cisco Nexus 3000 and 9000 Series Switches Port Channel ACL Programming Vulnerability2024-02-28