First published: Mon Aug 11 2014(Updated: )
Cisco NX-OS 6.1(2)I2(1) on Nexus 9000 switches does not properly process packet-drop policy checks for logged packets, which allows remote attackers to bypass intended access restrictions via a flood of packets matching a policy that contains the log keyword, aka Bug ID CSCuo02489.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =6.1\(2\)i2\(1\) | |
Cisco Nexus 9000 Firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3330 is considered a high-severity vulnerability due to its potential for remote exploitation.
To fix CVE-2014-3330, it is recommended to upgrade to a patched version of Cisco NX-OS that addresses this vulnerability.
CVE-2014-3330 affects Cisco NX-OS version 6.1(2)I2(1) running on Nexus 9000 switches.
Yes, CVE-2014-3330 can be exploited remotely by attackers through a flood of crafted packets.
CVE-2014-3330 can facilitate attacks that bypass intended access restrictions, allowing unauthorized network access.