First published: Wed Oct 05 2016(Updated: )
Cisco NX-OS before 7.0(3)I2(2e) and 7.0(3)I4 before 7.0(3)I4(1) has an incorrect iptables local-interface configuration, which allows remote attackers to obtain sensitive information via TCP or UDP traffic, aka Bug ID CSCuz05365.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco NX-OS | =7.0\(3\) | |
Cisco NX-OS | =7.0\(3\)i1\(1\) | |
Cisco NX-OS | =7.0\(3\)i1\(1a\) | |
Cisco NX-OS | =7.0\(3\)i1\(1b\) | |
Cisco NX-OS | =7.0\(3\)i1\(2\) | |
Cisco Nexus 93128TX Switch | ||
Cisco Nexus 9396px | ||
Cisco Nexus 9396tx | ||
Cisco Nexus 9504 | ||
Cisco Nexus 9508 | ||
Cisco Nexus 9516 | ||
Cisco Nexus N9336PQ |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-1455 is classified as a high severity vulnerability due to its potential to expose sensitive information to remote attackers.
To fix CVE-2016-1455, upgrade Cisco NX-OS to version 7.0(3)I2(2e) or later.
CVE-2016-1455 allows remote attackers to obtain sensitive information through unauthorized access via TCP or UDP traffic.
Devices running Cisco NX-OS before versions 7.0(3)I2(2e) and 7.0(3)I4(1) are considered vulnerable to CVE-2016-1455.
CVE-2016-1455 affects TCP and UDP protocols, allowing traffic to potentially expose sensitive information.