First published: Wed Feb 28 2024(Updated: )
A vulnerability in the access control list (ACL) programming for port channel subinterfaces of Cisco Nexus 3000 and 9000 Series Switches in standalone NX-OS mode could allow an unauthenticated, remote attacker to send traffic that should be blocked through an affected device.This
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nexus Series | ||
Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-nxos-po-acl-TkyePgvL is considered critical due to the potential for an unauthenticated remote attacker to bypass access control lists.
To fix cisco-sa-nxos-po-acl-TkyePgvL, apply the latest security patches and updates from Cisco for Nexus 3000 and 9000 Series Switches.
cisco-sa-nxos-po-acl-TkyePgvL affects Cisco Nexus 3000 and 9000 Series Switches operating in standalone NX-OS mode.
cisco-sa-nxos-po-acl-TkyePgvL can enable attacks where an attacker sends unauthorized traffic through the device, potentially leading to data breaches.
Authentication is not required to exploit cisco-sa-nxos-po-acl-TkyePgvL, making it a serious security concern.