cve-2023-20168
Vulnerability from cvelistv5
Published
2023-08-23 18:07
Modified
2024-08-02 09:05
Severity ?
EPSS score ?
Summary
A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | Cisco | Cisco NX-OS Software |
Version: 4.2(1)SV1(4) Version: 4.2(1)SV1(4a) Version: 4.2(1)SV1(4b) Version: 4.2(1)SV1(5.1) Version: 4.2(1)SV1(5.1a) Version: 4.2(1)SV1(5.2) Version: 4.2(1)SV1(5.2b) Version: 4.2(1)SV2(1.1) Version: 4.2(1)SV2(1.1a) Version: 4.2(1)SV2(2.1) Version: 4.2(1)SV2(2.1a) Version: 4.2(1)SV2(2.2) Version: 4.2(1)SV2(2.3) Version: 5.2(1)SM1(5.1) Version: 5.2(1)SM1(5.2) Version: 5.2(1)SM1(5.2a) Version: 5.2(1)SM1(5.2b) Version: 5.2(1)SM1(5.2c) Version: 5.2(1)SM3(1.1) Version: 5.2(1)SM3(1.1a) Version: 5.2(1)SM3(1.1b) Version: 5.2(1)SM3(1.1c) Version: 5.2(1)SM3(2.1) Version: 5.2(1)SV3(1.4) Version: 5.2(1)SV3(1.1) Version: 5.2(1)SV3(1.3) Version: 5.2(1)SV3(1.5a) Version: 5.2(1)SV3(1.5b) Version: 5.2(1)SV3(1.6) Version: 5.2(1)SV3(1.10) Version: 5.2(1)SV3(1.15) Version: 5.2(1)SV3(2.1) Version: 5.2(1)SV3(2.5) Version: 5.2(1)SV3(2.8) Version: 5.2(1)SV3(3.1) Version: 5.2(1)SV3(1.2) Version: 5.2(1)SV3(1.4b) Version: 5.2(1)SV3(3.15) Version: 5.2(1)SV3(4.1) Version: 5.2(1)SV3(4.1a) Version: 5.2(1)SV3(4.1b) Version: 5.2(1)SV3(4.1c) Version: 6.0(2)A3(1) Version: 6.0(2)A3(2) Version: 6.0(2)A3(4) Version: 6.0(2)A4(1) Version: 6.0(2)A4(2) Version: 6.0(2)A4(3) Version: 6.0(2)A4(4) Version: 6.0(2)A4(5) Version: 6.0(2)A4(6) Version: 6.0(2)A6(1) Version: 6.0(2)A6(1a) Version: 6.0(2)A6(2) Version: 6.0(2)A6(2a) Version: 6.0(2)A6(3) Version: 6.0(2)A6(3a) Version: 6.0(2)A6(4) Version: 6.0(2)A6(4a) Version: 6.0(2)A6(5) Version: 6.0(2)A6(5a) Version: 6.0(2)A6(5b) Version: 6.0(2)A6(6) Version: 6.0(2)A6(7) Version: 6.0(2)A6(8) Version: 6.0(2)A7(1) Version: 6.0(2)A7(1a) Version: 6.0(2)A7(2) Version: 6.0(2)A7(2a) Version: 6.0(2)A8(1) Version: 6.0(2)A8(2) Version: 6.0(2)A8(3) Version: 6.0(2)A8(4) Version: 6.0(2)A8(4a) Version: 6.0(2)A8(5) Version: 6.0(2)A8(6) Version: 6.0(2)A8(7) Version: 6.0(2)A8(7a) Version: 6.0(2)A8(7b) Version: 6.0(2)A8(8) Version: 6.0(2)A8(9) Version: 6.0(2)A8(10a) Version: 6.0(2)A8(10) Version: 6.0(2)A8(11) Version: 6.0(2)A8(11a) Version: 6.0(2)A8(11b) Version: 6.0(2)U2(1) Version: 6.0(2)U2(2) Version: 6.0(2)U2(3) Version: 6.0(2)U2(4) Version: 6.0(2)U2(5) Version: 6.0(2)U2(6) Version: 6.0(2)U3(1) Version: 6.0(2)U3(2) Version: 6.0(2)U3(3) Version: 6.0(2)U3(4) Version: 6.0(2)U3(5) Version: 6.0(2)U3(6) Version: 6.0(2)U3(7) Version: 6.0(2)U3(8) Version: 6.0(2)U3(9) Version: 6.0(2)U4(1) Version: 6.0(2)U4(2) Version: 6.0(2)U4(3) Version: 6.0(2)U4(4) Version: 6.0(2)U5(1) Version: 6.0(2)U5(2) Version: 6.0(2)U5(3) Version: 6.0(2)U5(4) Version: 6.0(2)U6(1) Version: 6.0(2)U6(2) Version: 6.0(2)U6(3) Version: 6.0(2)U6(4) Version: 6.0(2)U6(5) Version: 6.0(2)U6(6) Version: 6.0(2)U6(7) Version: 6.0(2)U6(8) Version: 6.0(2)U6(1a) Version: 6.0(2)U6(2a) Version: 6.0(2)U6(3a) Version: 6.0(2)U6(4a) Version: 6.0(2)U6(5a) Version: 6.0(2)U6(5b) Version: 6.0(2)U6(5c) Version: 6.0(2)U6(9) Version: 6.0(2)U6(10) Version: 6.2(2) Version: 6.2(2a) Version: 6.2(6) Version: 6.2(6b) Version: 6.2(8) Version: 6.2(8a) Version: 6.2(8b) Version: 6.2(10) Version: 6.2(12) Version: 6.2(18) Version: 6.2(16) Version: 6.2(14) Version: 6.2(6a) Version: 6.2(20) Version: 6.2(1) Version: 6.2(3) Version: 6.2(5) Version: 6.2(5a) Version: 6.2(5b) Version: 6.2(7) Version: 6.2(9) Version: 6.2(9a) Version: 6.2(9b) Version: 6.2(9c) Version: 6.2(11) Version: 6.2(11b) Version: 6.2(11c) Version: 6.2(11d) Version: 6.2(11e) Version: 6.2(13) Version: 6.2(13a) Version: 6.2(13b) Version: 6.2(15) Version: 6.2(17) Version: 6.2(19) Version: 6.2(21) Version: 6.2(23) Version: 6.2(20a) Version: 6.2(25) Version: 6.2(22) Version: 6.2(27) Version: 6.2(29) Version: 6.2(24) Version: 6.2(31) Version: 6.2(24a) Version: 6.2(33) Version: 7.0(3)F1(1) Version: 7.0(3)F2(1) Version: 7.0(3)F2(2) Version: 7.0(3)F3(1) Version: 7.0(3)F3(2) Version: 7.0(3)F3(3) Version: 7.0(3)F3(3a) Version: 7.0(3)F3(4) Version: 7.0(3)F3(3c) Version: 7.0(3)F3(5) Version: 7.0(3)I2(2a) Version: 7.0(3)I2(2b) Version: 7.0(3)I2(2c) Version: 7.0(3)I2(2d) Version: 7.0(3)I2(2e) Version: 7.0(3)I2(3) Version: 7.0(3)I2(4) Version: 7.0(3)I2(5) Version: 7.0(3)I2(1) Version: 7.0(3)I2(1a) Version: 7.0(3)I2(2) Version: 7.0(3)I3(1) Version: 7.0(3)I4(1) Version: 7.0(3)I4(2) Version: 7.0(3)I4(3) Version: 7.0(3)I4(4) Version: 7.0(3)I4(5) Version: 7.0(3)I4(6) Version: 7.0(3)I4(7) Version: 7.0(3)I4(8) Version: 7.0(3)I4(8a) Version: 7.0(3)I4(8b) Version: 7.0(3)I4(8z) Version: 7.0(3)I4(9) Version: 7.0(3)I5(1) Version: 7.0(3)I5(2) Version: 7.0(3)I6(1) Version: 7.0(3)I6(2) Version: 7.0(3)I7(1) Version: 7.0(3)I7(2) Version: 7.0(3)I7(3) Version: 7.0(3)I7(4) Version: 7.0(3)I7(5) Version: 7.0(3)I7(5a) Version: 7.0(3)I7(6) Version: 7.0(3)I7(7) Version: 7.0(3)I7(8) Version: 7.0(3)I7(9) Version: 7.0(3)I7(10) Version: 7.1(0)N1(1a) Version: 7.1(0)N1(1b) Version: 7.1(0)N1(1) Version: 7.1(1)N1(1) Version: 7.1(2)N1(1) Version: 7.1(3)N1(1) Version: 7.1(3)N1(2) Version: 7.1(4)N1(1) Version: 7.1(5)N1(1) Version: 7.1(5)N1(1b) Version: 7.2(0)D1(1) Version: 7.2(1)D1(1) Version: 7.2(2)D1(2) Version: 7.2(2)D1(1) Version: 7.3(0)D1(1) Version: 7.3(0)DX(1) Version: 7.3(0)DY(1) Version: 7.3(0)N1(1) Version: 7.3(1)D1(1) Version: 7.3(1)DY(1) Version: 7.3(1)N1(1) Version: 7.3(2)D1(1) Version: 7.3(2)D1(2) Version: 7.3(2)D1(3) Version: 7.3(2)D1(3a) Version: 7.3(2)N1(1) Version: 7.3(3)N1(1) Version: 8.0(1) Version: 8.1(1) Version: 8.1(2) Version: 8.1(2a) Version: 8.1(1a) Version: 8.1(1b) Version: 8.2(1) Version: 8.2(2) Version: 8.2(3) Version: 8.2(4) Version: 8.2(5) Version: 8.2(6) Version: 8.2(7) Version: 8.2(7a) Version: 8.2(8) Version: 8.2(9) Version: 8.3(1) Version: 8.3(2) Version: 9.2(1) Version: 9.2(2) Version: 9.2(2t) Version: 9.2(3) Version: 9.2(4) Version: 9.2(2v) Version: 9.2(1a) Version: 7.3(4)N1(1) Version: 7.3(3)D1(1) Version: 7.3(4)D1(1) Version: 7.3(5)N1(1) Version: 5.2(1)SK3(1.1) Version: 5.2(1)SK3(2.1) Version: 5.2(1)SK3(2.2) Version: 5.2(1)SK3(2.2b) Version: 5.2(1)SK3(2.1a) Version: 5.2(1)SV5(1.1) Version: 5.2(1)SV5(1.2) Version: 5.2(1)SV5(1.3) Version: 5.2(1)SV5(1.3a) Version: 5.2(1)SV5(1.3b) Version: 5.2(1)SV5(1.3c) Version: 8.4(1) Version: 8.4(1a) Version: 8.4(2) Version: 8.4(2a) Version: 8.4(3) Version: 8.4(2b) Version: 8.4(4) Version: 8.4(2c) Version: 8.4(4a) Version: 8.4(5) Version: 8.4(2d) Version: 8.4(6) Version: 8.4(2e) Version: 8.4(6a) Version: 8.4(7) Version: 8.4(2f) Version: 9.3(1) Version: 9.3(2) Version: 9.3(3) Version: 9.3(4) Version: 9.3(5) Version: 9.3(6) Version: 9.3(7) Version: 9.3(7a) Version: 9.3(8) Version: 9.3(9) Version: 9.3(10) Version: 9.3(11) Version: 7.3(6)N1(1) Version: 7.3(5)D1(1) Version: 7.3(7)N1(1) Version: 7.3(7)N1(1a) Version: 7.3(7)N1(1b) Version: 7.3(6)D1(1) Version: 7.3(8)N1(1) Version: 7.3(7)D1(1) Version: 7.3(9)N1(1) Version: 10.1(1) Version: 10.1(2) Version: 10.1(2t) Version: 8.5(1) Version: 7.3(10)N1(1) Version: 7.3(8)D1(1) Version: 10.2(1) Version: 10.2(1q) Version: 10.2(2) Version: 10.2(3) Version: 10.2(3t) Version: 10.2(4) Version: 10.2(5) Version: 7.3(9)D1(1) Version: 7.3(11)N1(1) Version: 7.3(12)N1(1) Version: 10.3(1) Version: 10.3(2) Version: 7.3(13)N1(1) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T09:05:35.038Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-nxos-remoteauth-dos-XB6pv74m", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco NX-OS Software", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "4.2(1)SV1(4)" }, { "status": "affected", "version": "4.2(1)SV1(4a)" }, { "status": "affected", "version": "4.2(1)SV1(4b)" }, { "status": "affected", "version": "4.2(1)SV1(5.1)" }, { "status": "affected", "version": "4.2(1)SV1(5.1a)" }, { "status": "affected", "version": "4.2(1)SV1(5.2)" }, { "status": "affected", "version": "4.2(1)SV1(5.2b)" }, { "status": "affected", "version": "4.2(1)SV2(1.1)" }, { "status": "affected", "version": "4.2(1)SV2(1.1a)" }, { "status": "affected", "version": "4.2(1)SV2(2.1)" }, { "status": "affected", "version": "4.2(1)SV2(2.1a)" }, { "status": "affected", "version": "4.2(1)SV2(2.2)" }, { "status": "affected", "version": "4.2(1)SV2(2.3)" }, { "status": "affected", "version": "5.2(1)SM1(5.1)" }, { "status": "affected", "version": "5.2(1)SM1(5.2)" }, { "status": "affected", "version": "5.2(1)SM1(5.2a)" }, { "status": "affected", "version": "5.2(1)SM1(5.2b)" }, { "status": "affected", "version": "5.2(1)SM1(5.2c)" }, { "status": "affected", "version": "5.2(1)SM3(1.1)" }, { "status": "affected", "version": "5.2(1)SM3(1.1a)" }, { "status": "affected", "version": "5.2(1)SM3(1.1b)" }, { "status": "affected", "version": "5.2(1)SM3(1.1c)" }, { "status": "affected", "version": "5.2(1)SM3(2.1)" }, { "status": "affected", "version": "5.2(1)SV3(1.4)" }, { "status": "affected", "version": "5.2(1)SV3(1.1)" }, { "status": "affected", "version": "5.2(1)SV3(1.3)" }, { "status": "affected", "version": "5.2(1)SV3(1.5a)" }, { "status": "affected", "version": "5.2(1)SV3(1.5b)" }, { "status": "affected", "version": "5.2(1)SV3(1.6)" }, { "status": "affected", "version": "5.2(1)SV3(1.10)" }, { "status": "affected", "version": "5.2(1)SV3(1.15)" }, { "status": "affected", "version": "5.2(1)SV3(2.1)" }, { "status": "affected", "version": "5.2(1)SV3(2.5)" }, { "status": "affected", "version": "5.2(1)SV3(2.8)" }, { "status": "affected", "version": "5.2(1)SV3(3.1)" }, { "status": "affected", "version": "5.2(1)SV3(1.2)" }, { "status": "affected", "version": "5.2(1)SV3(1.4b)" }, { "status": "affected", "version": "5.2(1)SV3(3.15)" }, { "status": "affected", "version": "5.2(1)SV3(4.1)" }, { "status": "affected", "version": "5.2(1)SV3(4.1a)" }, { "status": "affected", "version": "5.2(1)SV3(4.1b)" }, { "status": "affected", "version": "5.2(1)SV3(4.1c)" }, { "status": "affected", "version": "6.0(2)A3(1)" }, { "status": "affected", "version": "6.0(2)A3(2)" }, { "status": "affected", "version": "6.0(2)A3(4)" }, { "status": "affected", "version": "6.0(2)A4(1)" }, { "status": "affected", "version": "6.0(2)A4(2)" }, { "status": "affected", "version": "6.0(2)A4(3)" }, { "status": "affected", "version": "6.0(2)A4(4)" }, { "status": "affected", "version": "6.0(2)A4(5)" }, { "status": "affected", "version": "6.0(2)A4(6)" }, { "status": "affected", "version": "6.0(2)A6(1)" }, { "status": "affected", "version": "6.0(2)A6(1a)" }, { "status": "affected", "version": "6.0(2)A6(2)" }, { "status": "affected", "version": "6.0(2)A6(2a)" }, { "status": "affected", "version": "6.0(2)A6(3)" }, { "status": "affected", "version": "6.0(2)A6(3a)" }, { "status": "affected", "version": "6.0(2)A6(4)" }, { "status": "affected", "version": "6.0(2)A6(4a)" }, { "status": "affected", "version": "6.0(2)A6(5)" }, { "status": "affected", "version": "6.0(2)A6(5a)" }, { "status": "affected", "version": "6.0(2)A6(5b)" }, { "status": "affected", "version": "6.0(2)A6(6)" }, { "status": "affected", "version": "6.0(2)A6(7)" }, { "status": "affected", "version": "6.0(2)A6(8)" }, { "status": "affected", "version": "6.0(2)A7(1)" }, { "status": "affected", "version": "6.0(2)A7(1a)" }, { "status": "affected", "version": "6.0(2)A7(2)" }, { "status": "affected", "version": "6.0(2)A7(2a)" }, { "status": "affected", "version": "6.0(2)A8(1)" }, { "status": "affected", "version": "6.0(2)A8(2)" }, { "status": "affected", "version": "6.0(2)A8(3)" }, { "status": "affected", "version": "6.0(2)A8(4)" }, { "status": "affected", "version": "6.0(2)A8(4a)" }, { "status": "affected", "version": "6.0(2)A8(5)" }, { "status": "affected", "version": "6.0(2)A8(6)" }, { "status": "affected", "version": "6.0(2)A8(7)" }, { "status": "affected", "version": "6.0(2)A8(7a)" }, { "status": "affected", "version": "6.0(2)A8(7b)" }, { "status": "affected", "version": "6.0(2)A8(8)" }, { "status": "affected", "version": "6.0(2)A8(9)" }, { "status": "affected", "version": "6.0(2)A8(10a)" }, { "status": "affected", "version": "6.0(2)A8(10)" }, { "status": "affected", "version": "6.0(2)A8(11)" }, { "status": "affected", "version": "6.0(2)A8(11a)" }, { "status": "affected", "version": "6.0(2)A8(11b)" }, { "status": "affected", "version": "6.0(2)U2(1)" }, { "status": "affected", "version": "6.0(2)U2(2)" }, { "status": "affected", "version": "6.0(2)U2(3)" }, { "status": "affected", "version": "6.0(2)U2(4)" }, { "status": "affected", "version": "6.0(2)U2(5)" }, { "status": "affected", "version": "6.0(2)U2(6)" }, { "status": "affected", "version": "6.0(2)U3(1)" }, { "status": "affected", "version": "6.0(2)U3(2)" }, { "status": "affected", "version": "6.0(2)U3(3)" }, { "status": "affected", "version": "6.0(2)U3(4)" }, { "status": "affected", "version": "6.0(2)U3(5)" }, { "status": "affected", "version": "6.0(2)U3(6)" }, { "status": "affected", "version": "6.0(2)U3(7)" }, { "status": "affected", "version": "6.0(2)U3(8)" }, { "status": "affected", "version": "6.0(2)U3(9)" }, { "status": "affected", "version": "6.0(2)U4(1)" }, { "status": "affected", "version": "6.0(2)U4(2)" }, { "status": "affected", "version": "6.0(2)U4(3)" }, { "status": "affected", "version": "6.0(2)U4(4)" }, { "status": "affected", "version": "6.0(2)U5(1)" }, { "status": "affected", "version": "6.0(2)U5(2)" }, { "status": "affected", "version": "6.0(2)U5(3)" }, { "status": "affected", "version": "6.0(2)U5(4)" }, { "status": "affected", "version": "6.0(2)U6(1)" }, { "status": "affected", "version": "6.0(2)U6(2)" }, { "status": "affected", "version": "6.0(2)U6(3)" }, { "status": "affected", "version": "6.0(2)U6(4)" }, { "status": "affected", "version": "6.0(2)U6(5)" }, { "status": "affected", "version": "6.0(2)U6(6)" }, { "status": "affected", "version": "6.0(2)U6(7)" }, { "status": "affected", "version": "6.0(2)U6(8)" }, { "status": "affected", "version": "6.0(2)U6(1a)" }, { "status": "affected", "version": "6.0(2)U6(2a)" }, { "status": "affected", "version": "6.0(2)U6(3a)" }, { "status": "affected", "version": "6.0(2)U6(4a)" }, { "status": "affected", "version": "6.0(2)U6(5a)" }, { "status": "affected", "version": "6.0(2)U6(5b)" }, { "status": "affected", "version": "6.0(2)U6(5c)" }, { "status": "affected", "version": "6.0(2)U6(9)" }, { "status": "affected", "version": "6.0(2)U6(10)" }, { "status": "affected", "version": "6.2(2)" }, { "status": "affected", "version": "6.2(2a)" }, { "status": "affected", "version": "6.2(6)" }, { "status": "affected", "version": "6.2(6b)" }, { "status": "affected", "version": "6.2(8)" }, { "status": "affected", "version": "6.2(8a)" }, { "status": "affected", "version": "6.2(8b)" }, { "status": "affected", "version": "6.2(10)" }, { "status": "affected", "version": "6.2(12)" }, { "status": "affected", "version": "6.2(18)" }, { "status": "affected", "version": "6.2(16)" }, { "status": "affected", "version": "6.2(14)" }, { "status": "affected", "version": "6.2(6a)" }, { "status": "affected", "version": "6.2(20)" }, { "status": "affected", "version": "6.2(1)" }, { "status": "affected", "version": "6.2(3)" }, { "status": "affected", "version": "6.2(5)" }, { "status": "affected", "version": "6.2(5a)" }, { "status": "affected", "version": "6.2(5b)" }, { "status": "affected", "version": "6.2(7)" }, { "status": "affected", "version": "6.2(9)" }, { "status": "affected", "version": "6.2(9a)" }, { "status": "affected", "version": "6.2(9b)" }, { "status": "affected", "version": "6.2(9c)" }, { "status": "affected", "version": "6.2(11)" }, { "status": "affected", "version": "6.2(11b)" }, { "status": "affected", "version": "6.2(11c)" }, { "status": "affected", "version": "6.2(11d)" }, { "status": "affected", "version": "6.2(11e)" }, { "status": "affected", "version": "6.2(13)" }, { "status": "affected", "version": "6.2(13a)" }, { "status": "affected", "version": "6.2(13b)" }, { "status": "affected", "version": "6.2(15)" }, { "status": "affected", "version": "6.2(17)" }, { "status": "affected", "version": "6.2(19)" }, { "status": "affected", "version": "6.2(21)" }, { "status": "affected", "version": "6.2(23)" }, { "status": "affected", "version": "6.2(20a)" }, { "status": "affected", "version": "6.2(25)" }, { "status": "affected", "version": "6.2(22)" }, { "status": "affected", "version": "6.2(27)" }, { "status": "affected", "version": "6.2(29)" }, { "status": "affected", "version": "6.2(24)" }, { "status": "affected", "version": "6.2(31)" }, { "status": "affected", "version": "6.2(24a)" }, { "status": "affected", "version": "6.2(33)" }, { "status": "affected", "version": "7.0(3)F1(1)" }, { "status": "affected", "version": "7.0(3)F2(1)" }, { "status": "affected", "version": "7.0(3)F2(2)" }, { "status": "affected", "version": "7.0(3)F3(1)" }, { "status": "affected", "version": "7.0(3)F3(2)" }, { "status": "affected", "version": "7.0(3)F3(3)" }, { "status": "affected", "version": "7.0(3)F3(3a)" }, { "status": "affected", "version": "7.0(3)F3(4)" }, { "status": "affected", "version": "7.0(3)F3(3c)" }, { "status": "affected", "version": "7.0(3)F3(5)" }, { "status": "affected", "version": "7.0(3)I2(2a)" }, { "status": "affected", "version": "7.0(3)I2(2b)" }, { "status": "affected", "version": "7.0(3)I2(2c)" }, { "status": "affected", "version": "7.0(3)I2(2d)" }, { "status": "affected", "version": "7.0(3)I2(2e)" }, { "status": "affected", "version": "7.0(3)I2(3)" }, { "status": "affected", "version": "7.0(3)I2(4)" }, { "status": "affected", "version": "7.0(3)I2(5)" }, { "status": "affected", "version": "7.0(3)I2(1)" }, { "status": "affected", "version": "7.0(3)I2(1a)" }, { "status": "affected", "version": "7.0(3)I2(2)" }, { "status": "affected", "version": "7.0(3)I3(1)" }, { "status": "affected", "version": "7.0(3)I4(1)" }, { "status": "affected", "version": "7.0(3)I4(2)" }, { "status": "affected", "version": "7.0(3)I4(3)" }, { "status": "affected", "version": "7.0(3)I4(4)" }, { "status": "affected", "version": "7.0(3)I4(5)" }, { "status": "affected", "version": "7.0(3)I4(6)" }, { "status": "affected", "version": "7.0(3)I4(7)" }, { "status": "affected", "version": "7.0(3)I4(8)" }, { "status": "affected", "version": "7.0(3)I4(8a)" }, { "status": "affected", "version": "7.0(3)I4(8b)" }, { "status": "affected", "version": "7.0(3)I4(8z)" }, { "status": "affected", "version": "7.0(3)I4(9)" }, { "status": "affected", "version": "7.0(3)I5(1)" }, { "status": "affected", "version": "7.0(3)I5(2)" }, { "status": "affected", "version": "7.0(3)I6(1)" }, { "status": "affected", "version": "7.0(3)I6(2)" }, { "status": "affected", "version": "7.0(3)I7(1)" }, { "status": "affected", "version": "7.0(3)I7(2)" }, { "status": "affected", "version": "7.0(3)I7(3)" }, { "status": "affected", "version": "7.0(3)I7(4)" }, { "status": "affected", "version": "7.0(3)I7(5)" }, { "status": "affected", "version": "7.0(3)I7(5a)" }, { "status": "affected", "version": "7.0(3)I7(6)" }, { "status": "affected", "version": "7.0(3)I7(7)" }, { "status": "affected", "version": "7.0(3)I7(8)" }, { "status": "affected", "version": "7.0(3)I7(9)" }, { "status": "affected", "version": "7.0(3)I7(10)" }, { "status": "affected", "version": "7.1(0)N1(1a)" }, { "status": "affected", "version": "7.1(0)N1(1b)" }, { "status": "affected", "version": "7.1(0)N1(1)" }, { "status": "affected", "version": "7.1(1)N1(1)" }, { "status": "affected", "version": "7.1(2)N1(1)" }, { "status": "affected", "version": "7.1(3)N1(1)" }, { "status": "affected", "version": "7.1(3)N1(2)" }, { "status": "affected", "version": "7.1(4)N1(1)" }, { "status": "affected", "version": "7.1(5)N1(1)" }, { "status": "affected", "version": "7.1(5)N1(1b)" }, { "status": "affected", "version": "7.2(0)D1(1)" }, { "status": "affected", "version": "7.2(1)D1(1)" }, { "status": "affected", "version": "7.2(2)D1(2)" }, { "status": "affected", "version": "7.2(2)D1(1)" }, { "status": "affected", "version": "7.3(0)D1(1)" }, { "status": "affected", "version": "7.3(0)DX(1)" }, { "status": "affected", "version": "7.3(0)DY(1)" }, { "status": "affected", "version": "7.3(0)N1(1)" }, { "status": "affected", "version": "7.3(1)D1(1)" }, { "status": "affected", "version": "7.3(1)DY(1)" }, { "status": "affected", "version": "7.3(1)N1(1)" }, { "status": "affected", "version": "7.3(2)D1(1)" }, { "status": "affected", "version": "7.3(2)D1(2)" }, { "status": "affected", "version": "7.3(2)D1(3)" }, { "status": "affected", "version": "7.3(2)D1(3a)" }, { "status": "affected", "version": "7.3(2)N1(1)" }, { "status": "affected", "version": "7.3(3)N1(1)" }, { "status": "affected", "version": "8.0(1)" }, { "status": "affected", "version": "8.1(1)" }, { "status": "affected", "version": "8.1(2)" }, { "status": "affected", "version": "8.1(2a)" }, { "status": "affected", "version": "8.1(1a)" }, { "status": "affected", "version": "8.1(1b)" }, { "status": "affected", "version": "8.2(1)" }, { "status": "affected", "version": "8.2(2)" }, { "status": "affected", "version": "8.2(3)" }, { "status": "affected", "version": "8.2(4)" }, { "status": "affected", "version": "8.2(5)" }, { "status": "affected", "version": "8.2(6)" }, { "status": "affected", "version": "8.2(7)" }, { "status": "affected", "version": "8.2(7a)" }, { "status": "affected", "version": "8.2(8)" }, { "status": "affected", "version": "8.2(9)" }, { "status": "affected", "version": "8.3(1)" }, { "status": "affected", "version": "8.3(2)" }, { "status": "affected", "version": "9.2(1)" }, { "status": "affected", "version": "9.2(2)" }, { "status": "affected", "version": "9.2(2t)" }, { "status": "affected", "version": "9.2(3)" }, { "status": "affected", "version": "9.2(4)" }, { "status": "affected", "version": "9.2(2v)" }, { "status": "affected", "version": "9.2(1a)" }, { "status": "affected", "version": "7.3(4)N1(1)" }, { "status": "affected", "version": "7.3(3)D1(1)" }, { "status": "affected", "version": "7.3(4)D1(1)" }, { "status": "affected", "version": "7.3(5)N1(1)" }, { "status": "affected", "version": "5.2(1)SK3(1.1)" }, { "status": "affected", "version": "5.2(1)SK3(2.1)" }, { "status": "affected", "version": "5.2(1)SK3(2.2)" }, { "status": "affected", "version": "5.2(1)SK3(2.2b)" }, { "status": "affected", "version": "5.2(1)SK3(2.1a)" }, { "status": "affected", "version": "5.2(1)SV5(1.1)" }, { "status": "affected", "version": "5.2(1)SV5(1.2)" }, { "status": "affected", "version": "5.2(1)SV5(1.3)" }, { "status": "affected", "version": "5.2(1)SV5(1.3a)" }, { "status": "affected", "version": "5.2(1)SV5(1.3b)" }, { "status": "affected", "version": "5.2(1)SV5(1.3c)" }, { "status": "affected", "version": "8.4(1)" }, { "status": "affected", "version": "8.4(1a)" }, { "status": "affected", "version": "8.4(2)" }, { "status": "affected", "version": "8.4(2a)" }, { "status": "affected", "version": "8.4(3)" }, { "status": "affected", "version": "8.4(2b)" }, { "status": "affected", "version": "8.4(4)" }, { "status": "affected", "version": "8.4(2c)" }, { "status": "affected", "version": "8.4(4a)" }, { "status": "affected", "version": "8.4(5)" }, { "status": "affected", "version": "8.4(2d)" }, { "status": "affected", "version": "8.4(6)" }, { "status": "affected", "version": "8.4(2e)" }, { "status": "affected", "version": "8.4(6a)" }, { "status": "affected", "version": "8.4(7)" }, { "status": "affected", "version": "8.4(2f)" }, { "status": "affected", "version": "9.3(1)" }, { "status": "affected", "version": "9.3(2)" }, { "status": "affected", "version": "9.3(3)" }, { "status": "affected", "version": "9.3(4)" }, { "status": "affected", "version": "9.3(5)" }, { "status": "affected", "version": "9.3(6)" }, { "status": "affected", "version": "9.3(7)" }, { "status": "affected", "version": "9.3(7a)" }, { "status": "affected", "version": "9.3(8)" }, { "status": "affected", "version": "9.3(9)" }, { "status": "affected", "version": "9.3(10)" }, { "status": "affected", "version": "9.3(11)" }, { "status": "affected", "version": "7.3(6)N1(1)" }, { "status": "affected", "version": "7.3(5)D1(1)" }, { "status": "affected", "version": "7.3(7)N1(1)" }, { "status": "affected", "version": "7.3(7)N1(1a)" }, { "status": "affected", "version": "7.3(7)N1(1b)" }, { "status": "affected", "version": "7.3(6)D1(1)" }, { "status": "affected", "version": "7.3(8)N1(1)" }, { "status": "affected", "version": "7.3(7)D1(1)" }, { "status": "affected", "version": "7.3(9)N1(1)" }, { "status": "affected", "version": "10.1(1)" }, { "status": "affected", "version": "10.1(2)" }, { "status": "affected", "version": "10.1(2t)" }, { "status": "affected", "version": "8.5(1)" }, { "status": "affected", "version": "7.3(10)N1(1)" }, { "status": "affected", "version": "7.3(8)D1(1)" }, { "status": "affected", "version": "10.2(1)" }, { "status": "affected", "version": "10.2(1q)" }, { "status": "affected", "version": "10.2(2)" }, { "status": "affected", "version": "10.2(3)" }, { "status": "affected", "version": "10.2(3t)" }, { "status": "affected", "version": "10.2(4)" }, { "status": "affected", "version": "10.2(5)" }, { "status": "affected", "version": "7.3(9)D1(1)" }, { "status": "affected", "version": "7.3(11)N1(1)" }, { "status": "affected", "version": "7.3(12)N1(1)" }, { "status": "affected", "version": "10.3(1)" }, { "status": "affected", "version": "10.3(2)" }, { "status": "affected", "version": "7.3(13)N1(1)" } ] } ], "descriptions": [ { "lang": "en", "value": "A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. " } ], "exploits": [ { "lang": "en", "value": "The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "cvssV3_1" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-120", "description": "Buffer Copy without Checking Size of Input (\u0027Classic Buffer Overflow\u0027)", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:48.712Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-nxos-remoteauth-dos-XB6pv74m", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m" } ], "source": { "advisory": "cisco-sa-nxos-remoteauth-dos-XB6pv74m", "defects": [ "CSCwe72368", "CSCwe72670", "CSCwe72648", "CSCwe72673", "CSCwe72674" ], "discovery": "EXTERNAL" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2023-20168", "datePublished": "2023-08-23T18:07:53.428Z", "dateReserved": "2022-10-27T18:47:50.362Z", "dateUpdated": "2024-08-02T09:05:35.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2023-20168\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2023-08-23T19:15:07.777\",\"lastModified\":\"2024-11-21T07:40:43.873\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in TACACS+ and RADIUS remote authentication for Cisco NX-OS Software could allow an unauthenticated, local attacker to cause an affected device to unexpectedly reload. This vulnerability is due to incorrect input validation when processing an authentication attempt if the directed request option is enabled for TACACS+ or RADIUS. An attacker could exploit this vulnerability by entering a crafted string at the login prompt of an affected device. A successful exploit could allow the attacker to cause the affected device to unexpectedly reload, resulting in a denial of service (DoS) condition. \"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.5,\"impactScore\":4.0},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.0,\"impactScore\":4.0}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-120\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-20\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:9.3\\\\(11\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C0B4E497-95AE-45FC-8F89-A7959CA9AF4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:10.2\\\\(5\\\\):*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C3018A70-3236-4885-8EB1-708442F74981\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FC2A6C31-438A-4CF5-A3F3-364B1672EB7D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E930332-CDDD-48D5-93BC-C22D693BBFA2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BF4B8FE-E134-4491-B5C2-C1CFEB64731B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4226DA0-9371-401C-8247-E6E636A116C3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7664666F-BCE4-4799-AEEA-3A73E6AD33F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3293438-3D18-45A2-B093-2C3F65783336\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F43B770-D96C-44EA-BC12-9F39FC4317B9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA782EB3-E8E6-4DCF-B39C-B3CBD46E4384\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CED628B5-97A8-4B26-AA40-BEC854982157\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BB9DD73-E31D-4921-A6D6-E14E04703588\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4532F513-0543-4960-9877-01F23CA7BA1B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B43502B-FD53-465A-B60F-6A359C6ACD99\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3229124-B097-4AAC-8ACD-2F9C89DCC3AB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3232:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C84D24C-2256-42AF-898A-221EBE9FE1E4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24FBE87B-8A4F-43A8-98A3-4A7D9C630937\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6ACD09AC-8B28-4ACB-967B-AB3D450BC137\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D397349-CCC6-479B-9273-FB1FFF4F34F2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC7286A7-780F-4A45-940A-4AD5C9D0F201\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA52D5C1-13D8-4D23-B022-954CCEF491F1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F7AF8D7-431B-43CE-840F-CC0817D159C0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DAC204C8-1A5A-4E85-824E-DC9B8F6A802D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAF5AF71-15DF-4151-A1CF-E138A7103FC8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10F80A72-AD54-4699-B8AE-82715F0B58E2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9354B6A2-D7D6-442E-BF4C-FE8A336D9E94\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"088C0323-683A-44F5-8D42-FF6EC85D080E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74CB4002-7636-4382-B33E-FBA060A13C34\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10CEBF73-3EE0-459A-86C5-F8F6243FE27C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95D2C4C3-65CE-4612-A027-AF70CEFC3233\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9232e:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83DA8BFA-D7A2-476C-A6F5-CAE610033BC2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"557ED31C-C26A-4FAE-8B14-D06B49F7F08B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9408:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8D5D5E2-B40B-475D-9EF3-8441016E37E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768BE390-5ED5-48A7-9E80-C4DE8BA979B1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DDC2F709-AFBE-48EA-A3A2-DA1134534FB6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E02DC82-0D26-436F-BA64-73C958932B0A\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:nx-os:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA35D4AA-24B3-428E-84ED-804EF941E9A9\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FD00AB9-F2DD-4D07-8DFF-E7B34824D66A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"54C0D908-D7BA-48C3-9963-14A3A32A2662\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56426D35-FCFD-406E-9144-2E66C8C86EFC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9134:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDB00911-C0B0-4A4E-A0B9-413EC9D9C25A\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9140:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F762E87A-BF80-4D33-ADDA-84369E068005\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9148:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"22E6B85A-3988-4EC5-B788-9664772CE64E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D25FA4A8-408B-4E94-B7D9-7DC54B61322F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"831B6D0F-A975-4CBA-B5BB-0AC4AD718FE8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B25B92ED-37C0-4653-9C5E-B4C13C46464C\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A72BDC4-6640-45CC-A128-0CDEE38D3ADC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90094569-AA2C-4D35-807F-9551FACE255F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"306AFBC9-A236-4D03-A1EB-CE7E838D8415\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12DB1A25-A7C9-412F-88BC-E89588896395\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"67CD5738-029B-43AA-9342-63719DC16138\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EF9DC03-5370-46FD-9CA8-AC4DF5E922FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E81D2CC1-376A-4D87-88EA-6E1831741EC6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2374E02D-46FE-477F-A74D-49E72149E6EC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3925D2CF-9D7C-4498-8AF2-45E15D5D009F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C677D356-86C9-4491-A6CA-5E6306B2BB70\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A3C579-7AAD-41A4-947F-CCB9B09402A5\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C44335D8-8A78-486C-A325-9691FA4C3271\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5182CB50-4D32-4835-B1A8-817D989F919F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36B3B617-7554-4C36-9B41-19AA3BD2F6E9\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B88879A9-A7F5-41E0-8A38-0E09E3FD27F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_1000_virtual_edge:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"5481E367-6692-48A3-8475-5299C5EE0822\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:microsoft_hyper-v:*:*\",\"matchCriteriaId\":\"B7063CEF-58CC-449E-BFDA-39371BA088AF\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_1000v:-:*:*:*:*:vmware_vsphere:*:*\",\"matchCriteriaId\":\"9A5FFC5B-6F90-4E8F-9AE2-B4DA4C7A144B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFC8699E-81C0-4374-B827-71B3916B910D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5519EA9-1236-4F51-9974-E3FC1B26B5D2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB0A3B06-8B25-4CD3-AFA9-5F928B1042F4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1766443C-1C5A-486E-A36F-D3045F364D78\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC4D4403-F93B-4CC8-B75F-7A5B03FEDD85\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"870F4379-68F6-4B34-B99B-107DFE0DBD63\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ABB6E612-4246-4408-B3F6-B31E771F5ACB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"91B129B2-2B31-4DE0-9F83-CC6E0C8729A0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CBD3CD0-B542-4B23-9C9D-061643BE44E8\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A22A2647-A4C0-4681-BBC5-D95ADBAA0457\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"367C2A49-4C4D-471B-9B34-AFAFA5AE9503\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2BB1A3A-668C-4B0D-8AC2-6B4758B3420B\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A58223F-3B15-420B-A6D4-841451CF0380\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9662D6B-AF0F-45C8-B7CD-AE7C76593FDB\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EAD169-9036-496E-B740-45D79546F6D6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0E01F0DE-EA8A-451F-BADF-1A7A48B0C633\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F557E38-09F6-42C6-BABA-3C3168B38BBA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_6004x:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F182AD1-6E51-456A-A8F7-8F3B92DBE4D0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12180BEB-7F21-4FA7-ABD2-E9A8EA7340F3\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7004:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36145717-6348-466D-87B4-B1A19F17BA55\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7009:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4831C5F4-AF09-4951-B7AC-9DAF1C7045B4\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7010:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BBDCF9-562C-44BA-B709-F91346F6F99F\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:h:cisco:nexus_7018:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"276BD181-125C-48EC-984C-29BAE20C21F8\"}]}]}],\"references\":[{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-remoteauth-dos-XB6pv74m\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.