First published: Wed Mar 24 2021(Updated: )
A vulnerability in the DECnet Phase IV and DECnet/OSI protocol processing of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient input validation of DECnet traffic that is received by an affected device. An attacker could exploit this vulnerability by sending DECnet traffic to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Software | =16.4.1 | |
Cisco IOS XE Software | =16.4.2 | |
Cisco IOS XE Software | =16.4.3 | |
Cisco IOS XE Software | =16.5.1 | |
Cisco IOS XE Software | =16.5.1a | |
Cisco IOS XE Software | =16.5.1b | |
Cisco IOS XE Software | =16.5.2 | |
Cisco IOS XE Software | =16.5.3 | |
Cisco IOS XE Software | =16.6.1 | |
Cisco IOS XE Software | =16.6.2 | |
Cisco IOS XE Software | =16.6.3 | |
Cisco IOS XE Software | =16.6.4 | |
Cisco IOS XE Software | =16.6.4a | |
Cisco IOS XE Software | =16.6.4s | |
Cisco IOS XE Software | =16.6.5 | |
Cisco IOS XE Software | =16.6.5a | |
Cisco IOS XE Software | =16.6.5b | |
Cisco IOS XE Software | =16.6.6 | |
Cisco IOS XE Software | =16.6.7 | |
Cisco IOS XE Software | =16.6.7a | |
Cisco IOS XE Software | =16.6.8 | |
Cisco IOS XE Software | =16.7.1 | |
Cisco IOS XE Software | =16.7.2 | |
Cisco IOS XE Software | =16.7.3 | |
Cisco IOS XE Software | =16.8.1 | |
Cisco IOS XE Software | =16.8.1a | |
Cisco IOS XE Software | =16.8.1b | |
Cisco IOS XE Software | =16.8.1c | |
Cisco IOS XE Software | =16.8.1s | |
Cisco IOS XE Software | =16.8.2 | |
Cisco IOS XE Software | =16.8.3 | |
Cisco IOS XE Software | =16.9.1 | |
Cisco IOS XE Software | =16.9.1a | |
Cisco IOS XE Software | =16.9.1b | |
Cisco IOS XE Software | =16.9.1c | |
Cisco IOS XE Software | =16.9.1d | |
Cisco IOS XE Software | =16.9.1s | |
Cisco IOS XE Software | =16.9.2 | |
Cisco IOS XE Software | =16.9.2a | |
Cisco IOS XE Software | =16.9.2s | |
Cisco IOS XE Software | =16.9.3 | |
Cisco IOS XE Software | =16.9.3a | |
Cisco IOS XE Software | =16.9.3h | |
Cisco IOS XE Software | =16.9.3s | |
Cisco IOS XE Software | =16.9.4 | |
Cisco IOS XE Software | =16.9.4c | |
Cisco IOS XE Software | =16.9.5 | |
Cisco IOS XE Software | =16.9.5f | |
Cisco IOS XE Software | =16.9.6 | |
Cisco IOS XE Software | =16.10.1 | |
Cisco IOS XE Software | =16.10.1a | |
Cisco IOS XE Software | =16.10.1b | |
Cisco IOS XE Software | =16.10.1e | |
Cisco IOS XE Software | =16.10.1s | |
Cisco IOS XE Software | =16.10.2 | |
Cisco IOS XE Software | =16.10.3 | |
Cisco IOS XE Software | =16.11.1 | |
Cisco IOS XE Software | =16.11.1a | |
Cisco IOS XE Software | =16.11.1b | |
Cisco IOS XE Software | =16.11.1c | |
Cisco IOS XE Software | =16.11.1s | |
Cisco IOS XE Software | =16.11.2 | |
Cisco IOS XE Software | =16.12.1 | |
Cisco IOS XE Software | =16.12.1a | |
Cisco IOS XE Software | =16.12.1c | |
Cisco IOS XE Software | =16.12.1s | |
Cisco IOS XE Software | =16.12.1t | |
Cisco IOS XE Software | =16.12.2 | |
Cisco IOS XE Software | =16.12.2a | |
Cisco IOS XE Software | =16.12.2s | |
Cisco IOS XE Software | =16.12.2t | |
Cisco IOS XE Software | =16.12.3 | |
Cisco IOS XE Software | =16.12.3a | |
Cisco IOS XE Software | =16.12.3s | |
Cisco IOS XE Software | =16.12.4 | |
Cisco IOS XE Software | =16.12.4a | |
Cisco IOS XE Software | =17.1.1 | |
Cisco IOS XE Software | =17.1.1a | |
Cisco IOS XE Software | =17.1.1s | |
Cisco IOS XE Software | =17.1.1t | |
Cisco IOS XE Software | =17.1.2 | |
Cisco IOS XE Software | =17.2.1 | |
Cisco IOS XE Software | =17.2.1a | |
Cisco IOS XE Software | =17.2.1r | |
Cisco IOS XE Software | =17.2.1v | |
Cisco IOS XE Software | =17.2.2 | |
Cisco IOS XE Software | =17.2.3 | |
Cisco IOS XE Software | =17.3.1 | |
Cisco IOS XE Software | =17.3.1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1352 has a high severity rating due to its potential to allow an unauthenticated attacker to cause a denial of service.
To fix CVE-2021-1352, upgrade your Cisco IOS XE Software to a version that is not affected by this vulnerability.
CVE-2021-1352 affects multiple versions of Cisco IOS XE, including 16.4.1 through 17.3.1.
The impact of CVE-2021-1352 is a denial of service, which can render affected devices inoperable.
There are no specific workarounds for CVE-2021-1352 aside from applying the recommended firmware update.