First published: Thu Feb 04 2021(Updated: )
A vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices could allow an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) that is configured for an interface of an affected device. The vulnerability is due to improper processing of IPv6 traffic that is sent through an affected device. An attacker could exploit this vulnerability by sending crafted IPv6 packets that traverse the affected device. A successful exploit could allow the attacker to access resources that would typically be protected by the interface ACL.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR | <6.6.3 | |
Cisco IOS XR | =7.1.0 | |
Cisco IOS XR | =7.2.0 | |
Cisco Ncs 540 | ||
Cisco Ncs 5501 | ||
Cisco Ncs 5501-se | ||
Cisco Ncs 5502 | ||
Cisco Ncs 5502-se | ||
Cisco Ncs 5508 | ||
Cisco Ncs 5516 | ||
Cisco Ncs 560 | ||
Cisco Nx-os | ||
Cisco Nexus 3600 | ||
Cisco Nexus 9500 R |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-1389 is a vulnerability in the IPv6 traffic processing of Cisco IOS XR Software and Cisco NX-OS Software for certain Cisco devices.
CVE-2021-1389 allows an unauthenticated, remote attacker to bypass an IPv6 access control list (ACL) configured for an interface on the affected device.
CVE-2021-1389 has a severity rating of 6.5 (medium).
Cisco IOS XR Software versions 6.6.3, 7.1.0, and 7.2.0, as well as Cisco NX-OS Software, are affected by CVE-2021-1389.
To fix CVE-2021-1389, it is recommended to upgrade to a fixed software release provided by Cisco.