The ACL implementation in Cisco NX-OS 5.0(2) and 5.0(3) prior to 5.0(3)N2(1) on Nexus 5000 series switches, and NX-OS prior to 5.0(3)U1(2a) on Nexus 3000 series switches, does not properly handle comments in conjunction with deny statements, which allows remote malicious users to bypass intended access restrictions in opportunistic circumstances by sending packets, aka Bug IDs CSCto09813 and CSCtr61490.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
cisco nx-os 5.0\\(3\\)n1\\(1c\\) |
||
cisco nx-os 5.0\\(2\\) |
||
cisco nx-os 5.0\\(3\\)n1\\(1a\\) |
||
cisco nx-os 5.0\\(3\\)n1\\(1b\\) |
||
cisco nx-os 5.0\\(3\\) |
||
cisco nx-os 5.0\\(3\\)n1\\(1\\) |
||
cisco nexus_5000 |
||
cisco nx-os 5.0\\(3\\)u1\\(1d\\) |
||
cisco nx-os |
||
cisco nx-os 5.0\\(3\\)u1\\(1a\\) |
||
cisco nx-os 5.0\\(3\\)u1\\(1b\\) |
||
cisco nexus_3000 |