A vulnerability in the access control list (ACL) programming of Cisco ASR 900 and ASR 920 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass a configured ACL. This vulnerability is due to incorrect programming of hardware when an ACL is configured using a method other than the configuration CLI. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr900acl-UeEyCxkv | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2021-09-22T00:00:00
Updated: 2021-09-23T02:25:30
Reserved: 2021-06-15T00:00:00
Link: CVE-2021-34696
JSON object: View
NVD Information
Status : Modified
Published: 2021-09-23T03:15:15.633
Modified: 2023-11-07T03:36:04.957
Link: CVE-2021-34696
JSON object: View
Redhat Information
No data.
CWE