CVE-2017-3875
Summary
| CVE | CVE-2017-3875 |
|---|---|
| State | PUBLISHED |
| Assigner | cisco |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-03-17 22:59:00 UTC |
| Updated | 2025-04-20 01:37:25 UTC |
| Description | An Access-Control Filtering Mechanisms Bypass vulnerability in certain access-control filtering mechanisms on Cisco Nexus 7000 Series Switches could allow an unauthenticated, remote attacker to bypass defined traffic configured within an access control list (ACL) on the affected system. More Information: CSCtz59354. Known Affected Releases: 5.2(4) 6.1(3)S5 6.1(3)S6 6.2(1.121)S0 7.2(1)D1(1) 7.3(0)ZN(0.161) 7.3(1)N1(0.1). Known Fixed Releases: 7.3(0)D1(1) 6.2(2) 6.1(5) 8.3(0)KMT(0.24) 8.3(0)CV(0.337) 7.3(1)N1(1) 7.3(0)ZN(0.210) 7.3(0)ZN(0.177) 7.3(0)ZD(0.194) 7.3(0)TSH(0.99) 7.3(0)SC(0.14) 7.3(0)RSP(0.7) 7.3(0)N1(1) 7.3(0)N1(0.193) 7.3(0)IZN(0.13) 7.3(0)IB(0.102) 7.3(0)GLF(0.44) 7.3(0)D1(0.178) 7.1(0)D1(0.14) 7.0(3)ITI2(1.6) 7.0(3)ISH1(2.13) 7.0(3)IFD6(0.78) 7.0(3)IFD6(0) 7.0(3)IDE6(0.12) 7.0(3)IDE6(0) 7.0(3)I2(1) 7.0(3)I2(0.315) 7.0(1)ZD(0.3) 7.0(0)ZD(0.84) 6.2(1.149)S0 6.2(0.285) 6.1(5.32)S0 6.1(4.97)S0 6.1(2.30)S0. |
Risk And Classification
Primary CVSS: v3.0 5.3 MEDIUM from [email protected]
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Problem Types: CWE-20 | Access-Control Filtering Mechanisms Bypass Vulnerability
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.0 | [email protected] | Primary | 5.3 | MEDIUM | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N |
| 2.0 | [email protected] | Primary | 5 | AV:N/AC:L/Au:N/C:N/I:P/A:N |
CVSS v3.0 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
LowAvailability
NoneCVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
PartialAvailability
NoneAV:N/AC:L/Au:N/C:N/I:P/A:N
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Hardware | Cisco | Nexus 7000 10-slot | - | All | All | All |
| Hardware | Cisco | Nexus 7000 18-slot | - | All | All | All |
| Hardware | Cisco | Nexus 7000 4-slot | - | All | All | All |
| Hardware | Cisco | Nexus 7000 9-slot | - | All | All | All |
| Hardware | Cisco | Nexus 7700 10-slot | - | All | All | All |
| Hardware | Cisco | Nexus 7700 18-slot | - | All | All | All |
| Hardware | Cisco | Nexus 7700 2-slot | - | All | All | All |
| Hardware | Cisco | Nexus 7700 6-slot | - | All | All | All |
| Operating System | Cisco | Nx-os | 5.2\(4\) | All | All | All |
| Operating System | Cisco | Nx-os | 6.1\(3\)s5 | All | All | All |
| Operating System | Cisco | Nx-os | 6.1\(3\)s6 | All | All | All |
| Operating System | Cisco | Nx-os | 6.2\(1.121\)s0 | All | All | All |
| Operating System | Cisco | Nx-os | 7.2\(1\)d1\(1\) | All | All | All |
| Operating System | Cisco | Nx-os | 7.3\(0\)zn\(0.161\) | All | All | All |
| Operating System | Cisco | Nx-os | 7.3\(1\)n1\(0.1\) | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Na | Cisco Nexus 7000 Series Switches | affected Cisco Nexus 7000 Series Switches | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco Nexus 7000 Series Switches Access-Control Filtering Mechanisms Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | tools.cisco.com | Vendor Advisory |
| Cisco Nexus 7000 Series Switches CVE-2017-3875 Security Bypass Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry |
| Cisco Nexus 7000 Series Lets Remote Users Bypass Certain Access Controls - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.