Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Cisco Nexus 9000 Series Fabric Switches ACI Mode Fabric Infrastructure VLAN Unauthorized Access Vulnerability
Vulnerability Description
A vulnerability in the fabric infrastructure VLAN connection establishment of the Cisco Nexus 9000 Series Application Centric Infrastructure (ACI) Mode Switch Software could allow an unauthenticated, adjacent attacker to bypass security validations and connect an unauthorized server to the infrastructure VLAN. The vulnerability is due to insufficient security requirements during the Link Layer Discovery Protocol (LLDP) setup phase of the infrastructure VLAN. An attacker could exploit this vulnerability by sending a malicious LLDP packet on the adjacent subnet to the Cisco Nexus 9000 Series Switch in ACI mode. A successful exploit could allow the attacker to connect an unauthorized server to the infrastructure VLAN, which is highly privileged. With a connection to the infrastructure VLAN, the attacker can make unauthorized connections to Cisco Application Policy Infrastructure Controller (APIC) services or join other host endpoints.
CVSS Information
N/A
Vulnerability Type
访问控制不恰当
Vulnerability Title
Cisco Nexus 9000 Series Fabric Switches 访问控制错误漏洞
Vulnerability Description
Cisco Nexus 9000 Series Fabric Switches是美国思科(Cisco)公司的一款9000系列光纤交换机。 Cisco Nexus 9000 Series Fabric Switches(处于ACI模式)中建立fabric infrastructure VLAN链接的过程存在访问控制错误漏洞。攻击者可通过在临近的子节点上向Cisco Nexus 9000 Series Switch发送恶意的LLDP数据包利用该漏洞绕过安全限制并将未授权的服务器连接到基础设施的VLAN。
CVSS Information
N/A
Vulnerability Type
N/A