Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.105711
Category:CISCO
Title:Cisco Nexus 9000 Series Switches Access List Bypass Vulnerability (Cisco-SA-20140806-CVE-2014-3330)
Summary:A vulnerability in the implementation of the access list; logging feature of Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote; attacker to bypass the access list restriction for the logged traffic.
Description:Summary:
A vulnerability in the implementation of the access list
logging feature of Cisco Nexus 9000 Series Switches could allow an unauthenticated, remote
attacker to bypass the access list restriction for the logged traffic.

Vulnerability Insight:
The vulnerability is due to insufficient policy checks for the
logged packets. An attacker could exploit this vulnerability by sending a flood of denied packets
that match an access list entry with the log keyword.

Vulnerability Impact:
An exploit could allow the attacker to bypass the access control
list for a small percentage of the packets, which would otherwise have been dropped.

Solution:
See the referenced vendor advisory for a solution.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2014-3330
BugTraq ID: 69057
http://www.securityfocus.com/bid/69057
Cisco Security Advisory: 20140805 Cisco Nexus 9000 Series Switches Access List Bypass Vulnerability
http://tools.cisco.com/security/center/content/CiscoSecurityNotice/CVE-2014-3330
http://www.securitytracker.com/id/1030676
XForce ISS Database: cisco-nexus-cve20143330-sec-bypass(95122)
https://exchange.xforce.ibmcloud.com/vulnerabilities/95122
CopyrightCopyright (C) 2016 Greenbone Networks GmbH

This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.