CVE-2016-6457
CVSS V2 Medium 6.1
CVSS V3 Medium 6.5
Description
A vulnerability in the Cisco Nexus 9000 Series Platform Leaf Switches for Application Centric Infrastructure (ACI) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition on the affected device. This vulnerability affects Cisco Nexus 9000 Series Leaf Switches (TOR) - ACI Mode and Cisco Application Policy Infrastructure Controller (APIC). More Information: CSCuy93241. Known Affected Releases: 11.2(2x) 11.2(3x) 11.3(1x) 11.3(2x) 12.0(1x). Known Fixed Releases: 11.2(2i) 11.2(2j) 11.2(3f) 11.2(3g) 11.2(3h) 11.2(3l) 11.3(0.236) 11.3(1j) 11.3(2i) 11.3(2j) 12.0(1r).
Overview
- CVE ID
- CVE-2016-6457
- Assigner
- ykramarz@cisco.com
- Vulnerability Status
- Analyzed
- Published Version
- 2016-11-19T03:03:00
- Last Modified Date
- 2021-12-14T20:59:17
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
AND | ||||
cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\(2\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.2\(3\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\(1\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:application_policy_infrastructure_controller:1.3\(2\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:a:cisco:application_policy_infrastructure_controller:2.0\(1\):*:*:*:*:*:*:* | 1 | OR | ||
AND | ||||
cpe:2.3:o:cisco:nx-os:11.2\(2g\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:11.2\(2h\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:11.2\(2i\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:11.2\(3c\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:11.2\(3e\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:11.2\(3h\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:11.3\(1i\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:11.3\(2f\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:11.3\(2h\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:11.3\(2i\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:12.0\(1m\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:12.0\(1n\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:12.0\(1o\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:12.0\(1p\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:o:cisco:nx-os:12.0\(1q\):*:*:*:*:*:*:* | 1 | OR | ||
cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:* | 0 | OR | ||
cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:* | 0 | OR |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:A/AC:L/Au:N/C:N/I:N/A:C
- Access Vector
- ADJACENT_NETWORK
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- NONE
- Integrity Impact
- NONE
- Availability Impact
- COMPLETE
- Base Score
- 6.1
- Severity
- MEDIUM
- Exploitability Score
- 6.5
- Impact Score
- 6.9
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Attack Vector
- ADJACENT_NETWORK
- Attack Compatibility
- LOW
- Privileges Required
- NONE
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- NONE
- Availability Impact
- HIGH
- Base Score
- 6.5
- Base Severity
- MEDIUM
- Exploitability Score
- 2.8
- Impact Score
- 3.6
References
Reference URL | Reference Tags |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161102-n9kapic | Mitigation Vendor Advisory |
http://www.securityfocus.com/bid/94077 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1037185 | Third Party Advisory VDB Entry |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2016-6457 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-6457 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:41:20 | Added to TrackCVE | |||
2022-12-02 12:06:43 | psirt@cisco.com | ykramarz@cisco.com | CVE Assigner | updated |
2022-12-02 12:06:43 | 2016-11-19T03:03Z | 2016-11-19T03:03:00 | CVE Published Date | updated |
2022-12-02 12:06:43 | 2021-12-14T20:59:17 | CVE Modified Date | updated | |
2022-12-02 12:06:43 | Analyzed | Vulnerability Status | updated |