This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Cisco First view 2009-09-08
Product Nx-Os Last view 2024-08-28
Version Type Os
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:* 139
cpe:2.3:o:cisco:nx-os:5.0(2a):*:*:*:*:*:*:* 106
cpe:2.3:o:cisco:nx-os:5.0(3):*:*:*:*:*:*:* 106
cpe:2.3:o:cisco:nx-os:4.0(0)n1(2):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:4.0(0)n1(2a):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:base:*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:4.0(1a)n1(1):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:4.2(6):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:4.0(1a)n1(1a):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:4.0(1a)n2(1):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:5.0(3)n1(1c):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:4.0(1a)n2(1a):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:4.2(4):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:4.0(0)n1(1a):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:4.2(3):*:*:*:*:*:*:* 105
cpe:2.3:o:cisco:nx-os:5.0(5):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:4.1.(5):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:5.0(2)n2(1a):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:4.2.(2a):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:5.0(2)n2(1):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:4.1.(2):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:4.1.(4):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:5.0(3)n2(2a):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:5.0(3)n2(2b):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:4.2(8):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:4.1.(3):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:5.0(3)n2(1):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:5.0(3)n2(2):*:*:*:*:*:*:* 104
cpe:2.3:o:cisco:nx-os:4.0(4)sv1(2):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:5.0(2)n1(1):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:4.2(1)n2(1):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:4.0(4)sv1(3c):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:4.2(1)n1(1):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:4.2(1)n2(1a):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:4.0(4)sv1(3b):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:4.0(4)sv1(3):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:4.0(4)sv1(1):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:4.0(4)sv1(3a):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:6.2(2):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:4.0(4)sv1(3d):*:*:*:*:*:*:* 103
cpe:2.3:o:cisco:nx-os:5.1(6):*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:nx-os:5.1(1a):*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:nx-os:6.0(2):*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:nx-os:5.1(3):*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:nx-os:5.1(5):*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:nx-os:1.0(1.110a):*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:nx-os:1.0(1e):*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:nx-os:5.2(3a):*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:nx-os:5.1(4):*:*:*:*:*:*:* 102
cpe:2.3:o:cisco:nx-os:4.1(3)n1(1):*:*:*:*:*:*:* 101

Related : CVE

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
  Date Alert Description
8.8 2024-08-28 CVE-2024-20286

A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.

The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.  Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.

8.8 2024-08-28 CVE-2024-20285

A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.

The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.  Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.

8.8 2024-08-28 CVE-2024-20284

A vulnerability in the Python interpreter of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to escape the Python sandbox and gain unauthorized access to the underlying operating system of the device.

The vulnerability is due to insufficient validation of user-supplied input. An attacker could exploit this vulnerability by manipulating specific functions within the Python interpreter. A successful exploit could allow an attacker to escape the Python sandbox and execute arbitrary commands on the underlying operating system with the privileges of the authenticated user.  Note: An attacker must be authenticated with Python execution privileges to exploit these vulnerabilities. For more information regarding Python execution privileges, see product-specific documentation, such as the section of the Cisco Nexus 9000 Series NX-OS Programmability Guide.

6.7 2024-07-01 CVE-2024-20399

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated user in possession of Administrator credentials to execute arbitrary commands as root on the underlying operating system of an affected device.

This vulnerability is due to insufficient validation of arguments that are passed to specific configuration CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected configuration CLI command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of root. Note: To successfully exploit this vulnerability on a Cisco NX-OS device, an attacker must have Administrator credentials. The following Cisco devices already allow administrative users to access the underlying operating system through the bash-shell feature, so, for these devices, this vulnerability does not grant any additional privileges:

Nexus 3000 Series Switches Nexus 7000 Series Switches that are running Cisco NX-OS Software releases 8.1(1) and later Nexus 9000 Series Switches in standalone NX-OS mode

8.6 2024-02-29 CVE-2024-20321

A vulnerability in the External Border Gateway Protocol (eBGP) implementation of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability exists because eBGP traffic is mapped to a shared hardware rate-limiter queue. An attacker could exploit this vulnerability by sending large amounts of network traffic with certain characteristics through an affected device. A successful exploit could allow the attacker to cause eBGP neighbor sessions to be dropped, leading to a DoS condition in the network.

6.6 2024-02-29 CVE-2024-20294

A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device.

This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device and having an authenticated user retrieve LLDP statistics from the affected device through CLI show commands or Simple Network Management Protocol (SNMP) requests. A successful exploit could allow the attacker to cause the LLDP service to crash and stop running on the affected device. In certain situations, the LLDP crash may result in a reload of the affected device.

Note: LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).

5.8 2024-02-29 CVE-2024-20291

A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device.

This vulnerability is due to incorrect hardware programming that occurs when configuration changes are made to port channel member ports. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to access network resources that should be protected by an ACL that was applied on port channel subinterfaces.

8.6 2024-02-29 CVE-2024-20267

A vulnerability with the handling of MPLS traffic for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause the netstack process to unexpectedly restart, which could cause the device to stop processing network traffic or to reload.

This vulnerability is due to lack of proper error checking when processing an ingress MPLS frame. An attacker could exploit this vulnerability by sending a crafted IPv6 packet that is encapsulated within an MPLS frame to an MPLS-enabled interface of the targeted device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition.

Note: The IPv6 packet can be generated multiple hops away from the targeted device and then encapsulated within MPLS. The DoS condition may occur when the NX-OS device processes the packet.

7.4 2023-08-23 CVE-2023-20169

A vulnerability in the Intermediate System-to-Intermediate System (IS-IS) protocol of Cisco NX-OS Software for the Cisco Nexus 3000 Series Switches and Cisco Nexus 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, adjacent attacker to cause the IS-IS process to unexpectedly restart, which could cause an affected device to reload.

This vulnerability is due to insufficient input validation when parsing an ingress IS-IS packet. An attacker could exploit this vulnerability by sending a crafted IS-IS packet to an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the unexpected restart of the IS-IS process, which could cause the affected device to reload. Note: The IS-IS protocol is a routing protocol. To exploit this vulnerability, an attacker must be Layer 2 adjacent to the affected device.

6.5 2023-08-23 CVE-2023-20168

A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.

5.4 2023-08-23 CVE-2023-20115

A vulnerability in the SFTP server implementation for Cisco Nexus 3000 Series Switches and 9000 Series Switches in standalone NX-OS mode could allow an authenticated, remote attacker to download or overwrite files from the underlying operating system of an affected device.

This vulnerability is due to a logic error when verifying the user role when an SFTP connection is opened to an affected device. An attacker could exploit this vulnerability by connecting and authenticating via SFTP as a valid, non-administrator user. A successful exploit could allow the attacker to read or overwrite files from the underlying operating system with the privileges of the authenticated user.

There are workarounds that address this vulnerability.

7.4 2023-07-12 CVE-2023-20185

A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic.

This vulnerability is due to an issue with the implementation of the ciphers that are used by the CloudSec encryption feature on affected switches. An attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to read or modify the traffic that is transmitted between the sites.

Cisco has not released and will not release software updates that address this vulnerability.

6.5 2023-02-23 CVE-2023-20089

A vulnerability in the Link Layer Discovery Protocol (LLDP) feature for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) Mode could allow an unauthenticated, adjacent attacker to cause a memory leak, which could result in an unexpected reload of the device. This vulnerability is due to incorrect error checking when parsing ingress LLDP packets. An attacker could exploit this vulnerability by sending a steady stream of crafted LLDP packets to an affected device. A successful exploit could allow the attacker to cause a memory leak, which could result in a denial of service (DoS) condition when the device unexpectedly reloads. Note: This vulnerability cannot be exploited by transit traffic through the device. The crafted LLDP packet must be targeted to a directly connected interface, and the attacker must be in the same broadcast domain as the affected device (Layer 2 adjacent). In addition, the attack surface for this vulnerability can be reduced by disabling LLDP on interfaces where it is not required.

7.8 2023-02-23 CVE-2023-20050

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, local attacker to execute arbitrary commands on the underlying operating system of an affected device. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI commands. An attacker could exploit this vulnerability by including crafted input as the argument of an affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user.

8.8 2022-02-23 CVE-2022-20650

A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an authenticated, remote attacker to execute arbitrary commands with root privileges. The vulnerability is due to insufficient input validation of user supplied data that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP POST request to the NX-API of an affected device. A successful exploit could allow the attacker to execute arbitrary commands with root privileges on the underlying operating system. Note: The NX-API feature is disabled by default.

4.3 2022-02-23 CVE-2022-20625

A vulnerability in the Cisco Discovery Protocol service of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause the service to restart, resulting in a denial of service (DoS) condition. This vulnerability is due to improper handling of Cisco Discovery Protocol messages that are processed by the Cisco Discovery Protocol service. An attacker could exploit this vulnerability by sending a series of malicious Cisco Discovery Protocol messages to an affected device. A successful exploit could allow the attacker to cause the Cisco Discovery Protocol service to fail and restart. In rare conditions, repeated failures of the process could occur, which could cause the entire device to restart.

7.5 2022-02-23 CVE-2022-20624

A vulnerability in the Cisco Fabric Services over IP (CFSoIP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient validation of incoming CFSoIP packets. An attacker could exploit this vulnerability by sending crafted CFSoIP packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

7.5 2022-02-23 CVE-2022-20623

A vulnerability in the rate limiter for Bidirectional Forwarding Detection (BFD) traffic of Cisco NX-OS Software for Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote attacker to cause BFD traffic to be dropped on an affected device. This vulnerability is due to a logic error in the BFD rate limiter functionality. An attacker could exploit this vulnerability by sending a crafted stream of traffic through the device. A successful exploit could allow the attacker to cause BFD traffic to be dropped, resulting in BFD session flaps. BFD session flaps can cause route instability and dropped traffic, resulting in a denial of service (DoS) condition. This vulnerability applies to both IPv4 and IPv6 traffic.

7.4 2021-09-23 CVE-2021-34714

A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process.

5.3 2021-08-25 CVE-2021-1591

A vulnerability in the EtherChannel port subscription logic of Cisco Nexus 9500 Series Switches could allow an unauthenticated, remote attacker to bypass access control list (ACL) rules that are configured on an affected device. This vulnerability is due to oversubscription of resources that occurs when applying ACLs to port channel interfaces. An attacker could exploit this vulnerability by attempting to access network resources that are protected by the ACL. A successful exploit could allow the attacker to access network resources that would be protected by the ACL that was applied on the port channel interface.

5.3 2021-08-25 CVE-2021-1590

A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a login process to unexpectedly restart, causing a denial of service (DoS) condition. This vulnerability is due to a logic error in the implementation of the system login block-for command when an attack is detected and acted upon. An attacker could exploit this vulnerability by performing a brute-force login attack on an affected device. A successful exploit could allow the attacker to cause a login process to reload, which could result in a delay during authentication to the affected device.

8.6 2021-08-25 CVE-2021-1588

A vulnerability in the MPLS Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper input validation when an affected device is processing an MPLS echo-request or echo-reply packet. An attacker could exploit this vulnerability by sending malicious MPLS echo-request or echo-reply packets to an interface that is enabled for MPLS forwarding on the affected device. A successful exploit could allow the attacker to cause the MPLS OAM process to crash and restart multiple times, causing the affected device to reload and resulting in a DoS condition.

8.6 2021-08-25 CVE-2021-1587

A vulnerability in the VXLAN Operation, Administration, and Maintenance (OAM) feature of Cisco NX-OS Software, known as NGOAM, could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific packets with a Transparent Interconnection of Lots of Links (TRILL) OAM EtherType. An attacker could exploit this vulnerability by sending crafted packets, including the TRILL OAM EtherType of 0x8902, to a device that is part of a VXLAN Ethernet VPN (EVPN) fabric. A successful exploit could allow the attacker to cause an affected device to experience high CPU usage and consume excessive system resources, which may result in overall control plane instability and cause the affected device to reload. Note: The NGOAM feature is disabled by default.

8.6 2021-08-25 CVE-2021-1586

A vulnerability in the Multi-Pod or Multi-Site network configurations for Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to unexpectedly restart the device, resulting in a denial of service (DoS) condition. This vulnerability exists because TCP traffic sent to a specific port on an affected device is not properly sanitized. An attacker could exploit this vulnerability by sending crafted TCP data to a specific port that is listening on a public-facing IP address for the Multi-Pod or Multi-Site configuration. A successful exploit could allow the attacker to cause the device to restart unexpectedly, resulting in a DoS condition.

6.7 2021-08-25 CVE-2021-1584

A vulnerability in Cisco Nexus 9000 Series Fabric Switches in Application Centric Infrastructure (ACI) mode could allow an authenticated, local attacker to elevate privileges on an affected device. This vulnerability is due to insufficient restrictions during the execution of a specific CLI command. An attacker with administrative privileges could exploit this vulnerability by performing a command injection attack on the vulnerable command. A successful exploit could allow the attacker to access the underlying operating system as root.

CWE : Common Weakness Enumeration

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
%idName
22% (54) CWE-20 Improper Input Validation
10% (24) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
9% (22) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
8% (19) CWE-399 Resource Management Errors
7% (18) CWE-264 Permissions, Privileges, and Access Controls
7% (17) CWE-88 Argument Injection or Modification
4% (11) CWE-347 Improper Verification of Cryptographic Signature
2% (7) CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')
2% (7) CWE-77 Improper Sanitization of Special Elements used in a Command ('Comma...
1% (4) CWE-732 Incorrect Permission Assignment for Critical Resource
1% (3) CWE-787 Out-of-bounds Write
1% (3) CWE-770 Allocation of Resources Without Limits or Throttling
1% (3) CWE-755 Improper Handling of Exceptional Conditions
1% (3) CWE-310 Cryptographic Issues
1% (3) CWE-287 Improper Authentication
1% (3) CWE-200 Information Exposure
1% (3) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
0% (2) CWE-772 Missing Release of Resource after Effective Lifetime
0% (2) CWE-668 Exposure of Resource to Wrong Sphere
0% (2) CWE-667 Insufficient Locking
0% (2) CWE-401 Failure to Release Memory Before Removing Last Reference ('Memory L...
0% (2) CWE-345 Insufficient Verification of Data Authenticity
0% (2) CWE-125 Out-of-bounds Read
0% (2) CWE-116 Improper Encoding or Escaping of Output
0% (1) CWE-798 Use of Hard-coded Credentials

Oval Markup Language : Definitions

OvalID Name
oval:org.mitre.oval:def:25963 SUSE-SU-2014:0879-1 -- Security update for quagga

Open Source Vulnerability Database (OSVDB)

id Description
76620 Cisco NX-OS / Unified Computing System Multiple Command Parsing Local Shell C...
75246 Cisco Nexus Series Switches ACL Deny Statement Security Bypass
50286 Cisco TCP/IP Implementation Queue Connection Saturation TCP State Table Remot...

Information Assurance Vulnerability Management (IAVM)

id Description
2014-B-0113 Cisco NX-OS Software Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0053881
2014-A-0077 Multiple Vulnerabilities in Cisco NX-OS Products
Severity: Category I - VMSKEY: V0051611
2013-A-0195 Multiple Vulnerabilities in Oracle & Sun Systems Product Suite
Severity: Category I - VMSKEY: V0040781
2013-B-0086 Cisco StarOS Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040039
2013-A-0157 Cisco ASA and Pix Firewall Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040041
2013-A-0159 Cisco IOS XE Remote Security Bypass Vulnerability
Severity: Category I - VMSKEY: V0040042
2013-A-0100 Multiple Vulnerabilities in Cisco NX-OS-Based Products
Severity: Category I - VMSKEY: V0037772

Snort® IPS/IDS

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2020-12-08 Cisco NX-OS protocol independent multicast denial of service attempt
RuleID : 54899 - Type : PROTOCOL-OTHER - Revision : 1
2020-12-08 Cisco NX-OS malformed BGP UPDATE denial of service attempt
RuleID : 54896 - Type : SERVER-OTHER - Revision : 1
2019-11-19 Cisco Nexus OS software command injection attempt
RuleID : 51898 - Type : OS-OTHER - Revision : 1
2020-12-05 Cisco NX-OS Software NX-API denial of service attempt
RuleID : 51367 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco NX-OS Software NX-API denial of service attempt
RuleID : 51366 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco NX-OS Software NX-API denial of service attempt
RuleID : 51365 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco NX-OS System Software NX-API command injection attempt
RuleID : 49350 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco FXOS and NX-OS LDAP denial of service attempt
RuleID : 49336 - Type : SERVER-OTHER - Revision : 2
2020-12-05 Cisco NX-OS Fabric Services Protocol stack buffer overflow attempt
RuleID : 49335 - Type : SERVER-OTHER - Revision : 2
2020-12-05 Cisco NX-OS Fabric Services Protocol stack buffer overflow attempt
RuleID : 49334 - Type : SERVER-OTHER - Revision : 2
2020-12-05 Cisco NX-OS precision time protocol denial of service attempt
RuleID : 48240 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco NX-OS precision time protocol denial of service attempt
RuleID : 48239 - Type : SERVER-OTHER - Revision : 1
2020-12-05 DHCPv6 flood denial of service attempt
RuleID : 47273 - Type : OS-OTHER - Revision : 1
2020-12-05 DHCPv6 flood denial of service attempt
RuleID : 47272 - Type : OS-OTHER - Revision : 1
2020-12-05 Cisco FX-OS mod_nuova stack buffer overflow attempt
RuleID : 47010 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco NX-OS NX-API cli_ascii command injection attempt
RuleID : 47009 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco NX-OS NX-API ins_api command injection attempt
RuleID : 47008 - Type : SERVER-WEBAPP - Revision : 1
2020-12-05 Cisco NX-OS Fabric Services Protocol denial of service attempt
RuleID : 46994 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco NX-OS Fabric Services Protocol denial of service attempt
RuleID : 46993 - Type : SERVER-OTHER - Revision : 1
2020-12-05 Cisco NX-OS NX-API privilege escalation attempt
RuleID : 46992 - Type : SERVER-WEBAPP - Revision : 1
2016-10-06 Cisco NX-OS malformed BGP UPDATE denial of service attempt
RuleID : 40343 - Type : SERVER-OTHER - Revision : 1
2016-05-27 Cisco IOS NX invalid ICMPv6 neighbor discovery hop limit denial of service at...
RuleID : 39065 - Type : SERVER-OTHER - Revision : 1
2016-03-14 Cisco NX-OS DHCP option parsing denial of service attempt
RuleID : 37426 - Type : SERVER-OTHER - Revision : 2
2016-03-14 Cisco NX-OS zero length DHCP VPN suboption denial of service attempt
RuleID : 37414 - Type : SERVER-OTHER - Revision : 2
2014-11-16 DHCPv6 flood denial of service attempt
RuleID : 31983 - Type : OS-OTHER - Revision : 2

Nessus® Vulnerability Scanner

This CPE Product have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-10-26 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20181017-nxos-snmp.nasl - Type: ACT_GATHER_INFO
2018-06-25 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180620-nxapi.nasl - Type: ACT_GATHER_INFO
2018-06-25 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20180620-cfs.nasl - Type: ACT_GATHER_INFO
2017-10-26 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20171018-aaavty.nasl - Type: ACT_GATHER_INFO
2017-10-24 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20171018-ppe-nx-os.nasl - Type: ACT_GATHER_INFO
2017-09-07 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170118-nexus-nx-os.nasl - Type: ACT_GATHER_INFO
2017-06-16 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170607-nxos.nasl - Type: ACT_GATHER_INFO
2017-04-14 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170315-nss1-nxos.nasl - Type: ACT_GATHER_INFO
2017-04-14 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20170315-nss-nxos.nasl - Type: ACT_GATHER_INFO
2016-11-22 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20161005-dhcp2-nxos.nasl - Type: ACT_GATHER_INFO
2016-11-22 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20161005-dhcp1-nxos.nasl - Type: ACT_GATHER_INFO
2016-10-18 Name: The remote device is affected by a buffer overflow vulnerability.
File: cisco-sa-20161005-otv-nxos.nasl - Type: ACT_GATHER_INFO
2016-10-14 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20161005-ssh-nxos.nasl - Type: ACT_GATHER_INFO
2016-06-22 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_jsa10749.nasl - Type: ACT_GATHER_INFO
2016-04-01 Name: The remote device is affected by a denial of service vulnerability.
File: cisco-sa-20160323-lisp-nxos.nasl - Type: ACT_GATHER_INFO
2016-04-01 Name: The remote device is affected by a denial of service vulnerability.
File: cisco-sa-20160323-lisp-ios.nasl - Type: ACT_GATHER_INFO
2016-03-09 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sa-20160302-netstack-nxos.nasl - Type: ACT_GATHER_INFO
2015-05-30 Name: The remote device is affected by a denial of service vulnerability.
File: cisco-sn-CVE-2014-3295-nxos.nasl - Type: ACT_GATHER_INFO
2015-04-27 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-CSCur14589-nxos.nasl - Type: ACT_GATHER_INFO
2015-04-09 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CSCuq92240-nxos.nasl - Type: ACT_GATHER_INFO
2014-10-17 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CSCte27874-nxos.nasl - Type: ACT_GATHER_INFO
2014-08-20 Name: The remote device is running a vulnerable version of NX-OS.
File: cisco-sn-CVE-2013-6975-nxos.nasl - Type: ACT_GATHER_INFO
2014-05-30 Name: The remote device is running a vulnerable version of NX-OS.
File: cisco-sa-20140521-nxos.nasl - Type: ACT_GATHER_INFO
2013-12-02 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CSCtd15904-nxos.nasl - Type: ACT_GATHER_INFO
2013-10-16 Name: The remote device is missing a vendor-supplied security patch.
File: cisco-sn-CSCtn13055-nxos.nasl - Type: ACT_GATHER_INFO