Loading HuntDB...

Cisco NX-OS System Software in ACI Mode

182 Versions 4 CVEs

Versions

13.2(3o)

OTHER 2 CVEs

12.0(2h)

OTHER 1 CVE

14.1(1i)

OTHER 3 CVEs

14.2(7s)

OTHER 3 CVEs

15.2(8i)

OTHER 1 CVE

15.2(4d)

OTHER 3 CVEs

14.2(1l)

OTHER 3 CVEs

12.1(2e)

OTHER 1 CVE

12.0(1n)

OTHER 1 CVE

13.2(5d)

OTHER 2 CVEs

13.0(2k)

OTHER 1 CVE

15.2(3f)

OTHER 3 CVEs

15.2(8e)

OTHER 3 CVEs

14.1(2w)

OTHER 3 CVEs

13.2(3i)

OTHER 2 CVEs

12.1(3h)

OTHER 1 CVE

12.2(1n)

OTHER 1 CVE

13.2(7f)

OTHER 2 CVEs

16.0(6c)

OTHER 1 CVE

13.2(5e)

OTHER 2 CVEs

13.1(2q)

OTHER 1 CVE

13.0(2h)

OTHER 1 CVE

14.2(6g)

OTHER 3 CVEs

12.1(1i)

OTHER 1 CVE

12.2(3s)

OTHER 1 CVE

12.3(1l)

OTHER 1 CVE

16.0(5h)

OTHER 2 CVEs

15.2(4f)

OTHER 3 CVEs

14.1(1j)

OTHER 3 CVEs

13.1(2p)

OTHER 1 CVE

14.2(3n)

OTHER 3 CVEs

13.0(2n)

OTHER 1 CVE

13.2(41d)

OTHER 1 CVE

15.2(6e)

OTHER 3 CVEs

15.2(8d)

OTHER 3 CVEs

13.2(2l)

OTHER 2 CVEs

15.0(1k)

OTHER 3 CVEs

16.0(3d)

OTHER 4 CVEs

14.2(1j)

OTHER 3 CVEs

13.1(1i)

OTHER 1 CVE

16.0(5j)

OTHER 2 CVEs

13.1(2t)

OTHER 1 CVE

14.1(2m)

OTHER 3 CVEs

15.2(2h)

OTHER 3 CVEs

15.3(2c)

OTHER 1 CVE

15.2(3e)

OTHER 3 CVEs

13.1(2v)

OTHER 1 CVE

12.2(3r)

OTHER 1 CVE

12.1(2k)

OTHER 1 CVE

14.0(1h)

OTHER 3 CVEs

12.1(3g)

OTHER 1 CVE

12.3(1o)

OTHER 1 CVE

14.2(5k)

OTHER 3 CVEs

16.0(1j)

OTHER 3 CVEs

13.1(2s)

OTHER 1 CVE

13.2(4e)

OTHER 2 CVEs

15.1(2e)

OTHER 3 CVEs

12.3(1e)

OTHER 1 CVE

14.2(7f)

OTHER 3 CVEs

12.0(1m)

OTHER 1 CVE

13.2(9f)

OTHER 2 CVEs

14.0(3d)

OTHER 3 CVEs

12.0(1p)

OTHER 1 CVE

12.0(1o)

OTHER 1 CVE

14.2(3l)

OTHER 3 CVEs

13.2(10f)

OTHER 2 CVEs

16.0(4c)

OTHER 2 CVEs

14.0(2c)

OTHER 3 CVEs

12.0(1r)

OTHER 1 CVE

12.0(2o)

OTHER 1 CVE

15.3(1d)

OTHER 3 CVEs

14.2(2f)

OTHER 3 CVEs

12.1(3j)

OTHER 1 CVE

14.1(2s)

OTHER 3 CVEs

14.2(1i)

OTHER 3 CVEs

13.2(6i)

OTHER 2 CVEs

12.2(2k)

OTHER 1 CVE

15.1(3e)

OTHER 3 CVEs

16.0(7e)

OTHER 1 CVE

15.1(4c)

OTHER 3 CVEs

13.2(10g)

OTHER 2 CVEs

14.1(2u)

OTHER 3 CVEs

12.0(2g)

OTHER 1 CVE

13.1(2o)

OTHER 1 CVE

13.2(9h)

OTHER 2 CVEs

12.2(2i)

OTHER 1 CVE

15.2(2f)

OTHER 3 CVEs

12.2(2e)

OTHER 1 CVE

14.2(7v)

OTHER 3 CVEs

14.2(7l)

OTHER 3 CVEs

13.2(7k)

OTHER 2 CVEs

12.2(3t)

OTHER 1 CVE

14.1(1k)

OTHER 3 CVEs

13.2(1m)

OTHER 2 CVEs

15.2(6g)

OTHER 3 CVEs

15.2(2g)

OTHER 3 CVEs

14.2(7r)

OTHER 3 CVEs

12.0(2m)

OTHER 1 CVE

12.0(1q)

OTHER 1 CVE

15.2(8f)

OTHER 3 CVEs

13.2(3j)

OTHER 1 CVE

13.2(3n)

OTHER 2 CVEs

15.2(5c)

OTHER 3 CVEs

15.2(1g)

OTHER 3 CVEs

15.2(6h)

OTHER 1 CVE

14.2(5n)

OTHER 3 CVEs

16.0(8e)

OTHER 1 CVE

15.2(5d)

OTHER 3 CVEs

15.2(7g)

OTHER 3 CVEs

14.2(5l)

OTHER 3 CVEs

15.2(4e)

OTHER 3 CVEs

15.2(3g)

OTHER 3 CVEs

15.3(2b)

OTHER 1 CVE

15.2(8h)

OTHER 2 CVEs

12.2(3j)

OTHER 1 CVE

14.2(4i)

OTHER 3 CVEs

13.2(2o)

OTHER 2 CVEs

14.2(7u)

OTHER 3 CVEs

13.2(4d)

OTHER 2 CVEs

15.0(1l)

OTHER 3 CVEs

14.2(2g)

OTHER 3 CVEs

12.2(1o)

OTHER 1 CVE

14.1(2x)

OTHER 3 CVEs

14.2(3j)

OTHER 3 CVEs

15.2(7f)

OTHER 3 CVEs

13.1(2m)

OTHER 1 CVE

12.2(4f)

OTHER 1 CVE

12.2(3p)

OTHER 1 CVE

12.2(4p)

OTHER 1 CVE

14.2(6o)

OTHER 3 CVEs

14.1(2o)

OTHER 3 CVEs

14.1(1l)

OTHER 3 CVEs

16.0(2j)

OTHER 4 CVEs

14.0(3c)

OTHER 3 CVEs

13.2(8d)

OTHER 1 CVE

13.1(2u)

OTHER 1 CVE

16.0(1g)

OTHER 3 CVEs

14.2(3q)

OTHER 3 CVEs

14.2(6h)

OTHER 3 CVEs

15.1(1h)

OTHER 3 CVEs

13.2(1l)

OTHER 2 CVEs

14.1(2g)

OTHER 3 CVEs

12.1(2g)

OTHER 1 CVE

14.2(7q)

OTHER 3 CVEs

12.3(1f)

OTHER 1 CVE

13.2(3s)

OTHER 2 CVEs

14.2(6d)

OTHER 3 CVEs

15.2(5e)

OTHER 3 CVEs

16.0(3e)

OTHER 4 CVEs

13.2(3r)

OTHER 2 CVEs

13.2(10e)

OTHER 2 CVEs

15.0(2e)

OTHER 3 CVEs

14.2(7w)

OTHER 3 CVEs

12.3(1i)

OTHER 1 CVE

12.2(2j)

OTHER 1 CVE

12.3(1p)

OTHER 1 CVE

14.2(2e)

OTHER 3 CVEs

15.0(2h)

OTHER 3 CVEs

15.3(2d)

OTHER 1 CVE

15.3(2a)

OTHER 1 CVE

12.2(4q)

OTHER 1 CVE

14.2(6l)

OTHER 3 CVEs

14.2(4p)

OTHER 3 CVEs

13.2(9b)

OTHER 2 CVEs

12.0(2n)

OTHER 1 CVE

14.2(4k)

OTHER 3 CVEs

16.1(1f)

OTHER 1 CVE

13.2(5f)

OTHER 2 CVEs

12.0(2l)

OTHER 1 CVE

16.0(2h)

OTHER 4 CVEs

14.2(7t)

OTHER 3 CVEs

14.2(4o)

OTHER 3 CVEs

12.1(1h)

OTHER 1 CVE

13.0(1k)

OTHER 1 CVE

12.2(4r)

OTHER 1 CVE

15.2(8g)

OTHER 3 CVEs

16.0(3g)

OTHER 2 CVEs

12.2(2f)

OTHER 1 CVE

12.0(2f)

OTHER 1 CVE

12.1(4a)

OTHER 1 CVE

15.2(2e)

OTHER 3 CVEs

12.2(2q)

OTHER 1 CVE

Recent CVEs

CVE-2024-20397

A vulnerability in the bootloader of Cisco NX-OS Software could allow an unauthenticated attacker with physical access to an affected device, or an authenticated, local attacker with administrative credentials, to bypass NX-OS image signature verification.  This vulnerability is due to insecure bootloader settings. An attacker could exploit this vulnerability by executing a series of bootloader commands. A successful exploit could allow the attacker to bypass NX-OS image signature verification and load unverified software.

MEDIUM Dec 04, 2024

CVE-2024-20289

A vulnerability in the CLI of Cisco NX-OS Software could allow an authenticated, low-privileged, local attacker to execute arbitrary commands on the underlying operating system of an affected device.  This vulnerability is due to insufficient validation of arguments for a specific CLI command. An attacker could exploit this vulnerability by including crafted input as the argument of the affected command. A successful exploit could allow the attacker to execute arbitrary commands on the underlying operating system with the privileges of the currently logged-in user.

MEDIUM Aug 28, 2024

CVE-2024-20294

A vulnerability in the Link Layer Discovery Protocol (LLDP) feature of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to improper handling of specific fields in an LLDP frame. An attacker could exploit this vulnerability by sending a crafted LLDP packet to an interface of an affected device and having an authenticated user retrieve LLDP statistics from the affected device through CLI show commands or Simple Network Management Protocol (SNMP) requests. A successful exploit could allow the attacker to cause the LLDP service to crash and stop running on the affected device. In certain situations, the LLDP crash may result in a reload of the affected device. Note: LLDP is a Layer 2 link protocol. To exploit this vulnerability, an attacker would need to be directly connected to an interface of an affected device, either physically or logically (for example, through a Layer 2 Tunnel configured to transport the LLDP protocol).

MEDIUM Feb 28, 2024

CVE-2023-20185

A vulnerability in the Cisco ACI Multi-Site CloudSec encryption feature of Cisco Nexus 9000 Series Fabric Switches in ACI mode could allow an unauthenticated, remote attacker to read or modify intersite encrypted traffic. This vulnerability is due to an issue with the implementation of the ciphers that are used by the CloudSec encryption feature on affected switches. An attacker with an on-path position between the ACI sites could exploit this vulnerability by intercepting intersite encrypted traffic and using cryptanalytic techniques to break the encryption. A successful exploit could allow the attacker to read or modify the traffic that is transmitted between the sites. Cisco has not released and will not release software updates that address this vulnerability.

HIGH Jul 12, 2023