CVE-2021-1590

Published on: 08/25/2021 12:00:00 AM UTC

Last Modified on: 09/03/2021 01:26:00 PM UTC

CVE-2021-1590 - advisory for cisco-sa-nxos-login-blockfor-RwjGVEcu

Source: Mitre Source: NIST CVE.ORG Print: PDF PDF
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L

Certain versions of Nexus 3000 from Cisco contain the following vulnerability:

A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a login process to unexpectedly restart, causing a denial of service (DoS) condition. This vulnerability is due to a logic error in the implementation of the system login block-for command when an attack is detected and acted upon. An attacker could exploit this vulnerability by performing a brute-force login attack on an affected device. A successful exploit could allow the attacker to cause a login process to reload, which could result in a delay during authentication to the affected device.

  • CVE-2021-1590 has been assigned by URL Logo [email protected] to track the vulnerability - currently rated as MEDIUM severity.
  • The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
  • Affected Vendor/Software: URL Logo Cisco - Cisco NX-OS Software version n/a

CVSS3 Score: 5.3 - MEDIUM

Attack
Vector
Attack
Complexity
Privileges
Required
User
Interaction
NETWORK LOW NONE NONE
Scope Confidentiality
Impact
Integrity
Impact
Availability
Impact
UNCHANGED NONE NONE LOW

CVSS2 Score: 4.3 - MEDIUM

Access
Vector
Access
Complexity
Authentication
NETWORK MEDIUM NONE
Confidentiality
Impact
Integrity
Impact
Availability
Impact
NONE NONE PARTIAL

CVE References

Description Tags Link
Cisco NX-OS Software system login block-for Denial of Service Vulnerability tools.cisco.com
text/html
URL Logo CISCO 20210825 Cisco NX-OS Software system login block-for Denial of Service Vulnerability

Related QID Numbers

  • 317024 Cisco NX-OS Software system login block-for Denial of Service Vulnerability (cisco-sa-nxos-login-blockfor-RwjGVEcu)

Exploit/POC from Github

PoC for exploiting CVE-2021-1590 : A vulnerability in the implementation of the system login block-for command for Ci…

Known Affected Configurations (CPE V2.3)

Type Vendor Product Version Update Edition Language
Hardware Device InfoCiscoNexus 3000-AllAllAll
Hardware Device InfoCiscoNexus 3048-AllAllAll
Hardware Device InfoCiscoNexus 31108pc-v-AllAllAll
Hardware Device InfoCiscoNexus 31108tc-v-AllAllAll
Hardware Device InfoCiscoNexus 31128pq-AllAllAll
Hardware Device InfoCiscoNexus 3132c-z-AllAllAll
Hardware Device InfoCiscoNexus 3132q-v-AllAllAll
Hardware Device InfoCiscoNexus 3132q-x/3132q-xl-AllAllAll
Hardware Device InfoCiscoNexus 3164q-AllAllAll
Hardware Device InfoCiscoNexus 3172pq/pq-xl-AllAllAll
Hardware Device InfoCiscoNexus 3172tq-xl-AllAllAll
Hardware Device InfoCiscoNexus 3232c-AllAllAll
Hardware Device InfoCiscoNexus 3264c-e-AllAllAll
Hardware Device InfoCiscoNexus 3264q-AllAllAll
Hardware Device InfoCiscoNexus 3408-s-AllAllAll
Hardware Device InfoCiscoNexus 34180yc-AllAllAll
Hardware Device InfoCiscoNexus 3432d-s-AllAllAll
Hardware Device InfoCiscoNexus 3464c-AllAllAll
Hardware Device InfoCiscoNexus 3524-x/xl-AllAllAll
Hardware Device InfoCiscoNexus 3548-x/xl-AllAllAll
Hardware Device InfoCiscoNexus 36180yc-r-AllAllAll
Hardware Device InfoCiscoNexus 3636c-r-AllAllAll
Hardware Device InfoCiscoNexus 5548p-AllAllAll
Hardware Device InfoCiscoNexus 5548up-AllAllAll
Hardware Device InfoCiscoNexus 5596t-AllAllAll
Hardware Device InfoCiscoNexus 5596up-AllAllAll
Hardware Device InfoCiscoNexus 56128p-AllAllAll
Hardware Device InfoCiscoNexus 5624q-AllAllAll
Hardware Device InfoCiscoNexus 5648q-AllAllAll
Hardware Device InfoCiscoNexus 5672up-AllAllAll
Hardware Device InfoCiscoNexus 5672up-16g-AllAllAll
Hardware Device InfoCiscoNexus 5696q-AllAllAll
Hardware Device InfoCiscoNexus 6001-AllAllAll
Hardware Device InfoCiscoNexus 6004-AllAllAll
Hardware Device InfoCiscoNexus 7000 10-slot-AllAllAll
Hardware Device InfoCiscoNexus 7000 18-slot-AllAllAll
Hardware Device InfoCiscoNexus 7000 4-slot-AllAllAll
Hardware Device InfoCiscoNexus 7000 9-slot-AllAllAll
Hardware Device InfoCiscoNexus 7000 Supervisor 1-AllAllAll
Hardware Device InfoCiscoNexus 7000 Supervisor 2-AllAllAll
Hardware Device InfoCiscoNexus 7000 Supervisor 2e-AllAllAll
Hardware Device InfoCiscoNexus 7004-AllAllAll
Hardware Device InfoCiscoNexus 7009-AllAllAll
Hardware Device InfoCiscoNexus 7010-AllAllAll
Hardware Device InfoCiscoNexus 7018-AllAllAll
Hardware Device InfoCiscoNexus 7700-AllAllAll
Hardware Device InfoCiscoNexus 7700 10-slot-AllAllAll
Hardware Device InfoCiscoNexus 7700 18-slot-AllAllAll
Hardware Device InfoCiscoNexus 7700 2-slot-AllAllAll
Hardware Device InfoCiscoNexus 7700 6-slot-AllAllAll
Hardware Device InfoCiscoNexus 7700 Supervisor 2e-AllAllAll
Hardware Device InfoCiscoNexus 7700 Supervisor 3e-AllAllAll
Hardware Device InfoCiscoNexus 7702-AllAllAll
Hardware Device InfoCiscoNexus 7706-AllAllAll
Hardware Device InfoCiscoNexus 7710-AllAllAll
Hardware Device InfoCiscoNexus 7718-AllAllAll
Hardware Device InfoCiscoNexus 9000v-AllAllAll
Hardware Device InfoCiscoNexus 92160yc-x-AllAllAll
Hardware Device InfoCiscoNexus 92300yc-AllAllAll
Hardware Device InfoCiscoNexus 92304qc-AllAllAll
Hardware Device InfoCiscoNexus 92348gc-x-AllAllAll
Hardware Device InfoCiscoNexus 9236c-AllAllAll
Hardware Device InfoCiscoNexus 9272q-AllAllAll
Hardware Device InfoCiscoNexus 93108tc-ex-AllAllAll
Hardware Device InfoCiscoNexus 93108tc-ex-24-AllAllAll
Hardware Device InfoCiscoNexus 93108tc-fx-AllAllAll
Hardware Device InfoCiscoNexus 93108tc-fx-24-AllAllAll
Hardware Device InfoCiscoNexus 93108tc-fx3p-AllAllAll
Hardware Device InfoCiscoNexus 93120tx-AllAllAll
Hardware Device InfoCiscoNexus 93128tx-AllAllAll
Hardware Device InfoCiscoNexus 9316d-gx-AllAllAll
Hardware Device InfoCiscoNexus 93180lc-ex-AllAllAll
Hardware Device InfoCiscoNexus 93180yc-ex-AllAllAll
Hardware Device InfoCiscoNexus 93180yc-ex-24-AllAllAll
Hardware Device InfoCiscoNexus 93180yc-fx-AllAllAll
Hardware Device InfoCiscoNexus 93180yc-fx-24-AllAllAll
Hardware Device InfoCiscoNexus 93180yc-fx3-AllAllAll
Hardware Device InfoCiscoNexus 93180yc-fx3s-AllAllAll
Hardware Device InfoCiscoNexus 93216tc-fx2-AllAllAll
Hardware Device InfoCiscoNexus 93240yc-fx2-AllAllAll
Hardware Device InfoCiscoNexus 9332c-AllAllAll
Hardware Device InfoCiscoNexus 9332pq-AllAllAll
Hardware Device InfoCiscoNexus 93360yc-fx2-AllAllAll
Hardware Device InfoCiscoNexus 9336c-fx2-AllAllAll
Hardware Device InfoCiscoNexus 9336c-fx2-e-AllAllAll
Hardware Device InfoCiscoNexus 9348gc-fxp-AllAllAll
Hardware Device InfoCiscoNexus 93600cd-gx-AllAllAll
Hardware Device InfoCiscoNexus 9364c-AllAllAll
Hardware Device InfoCiscoNexus 9364c-gx-AllAllAll
Hardware Device InfoCiscoNexus 9372px-AllAllAll
Hardware Device InfoCiscoNexus 9372px-e-AllAllAll
Hardware Device InfoCiscoNexus 9372tx-AllAllAll
Hardware Device InfoCiscoNexus 9372tx-e-AllAllAll
Hardware Device InfoCiscoNexus 9396px-AllAllAll
Hardware Device InfoCiscoNexus 9396tx-AllAllAll
Hardware Device InfoCiscoNexus 9508-AllAllAll
Operating
System
CiscoNx-os7.0\(3\)i4\(0.116\)AllAllAll
Operating
System
CiscoNx-os7.3\(7\)n1\(1b\)AllAllAll
Operating
System
CiscoUnified Computing SystemAllAllAllAll
Hardware Device InfoCiscoUnified Computing System 6248up-AllAllAll
Hardware Device InfoCiscoUnified Computing System 6296up-AllAllAll
Hardware Device InfoCiscoUnified Computing System 6324-AllAllAll
Hardware Device InfoCiscoUnified Computing System 6332-AllAllAll
Hardware Device InfoCiscoUnified Computing System 6332-16up-AllAllAll
  • cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3132q-x\/3132q-xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3172pq\/pq-xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3524-x\/xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3548-x\/xl:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7004:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7009:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7010:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7018:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7702:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7706:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7710:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_7718:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:nx-os:7.0\(3\)i4\(0.116\):*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:nx-os:7.3\(7\)n1\(1b\):*:*:*:*:*:*:*:
  • cpe:2.3:o:cisco:unified_computing_system:*:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:unified_computing_system_6248up:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:unified_computing_system_6296up:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:unified_computing_system_6324:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:unified_computing_system_6332:-:*:*:*:*:*:*:*:
  • cpe:2.3:h:cisco:unified_computing_system_6332-16up:-:*:*:*:*:*:*:*:

Social Mentions

Source Title Posted (UTC)
Twitter Icon @CVEreport CVE-2021-1590 : A vulnerability in the implementation of the system login block-for command for Cisco NX-OS Softw… twitter.com/i/web/status/1… 2021-08-25 19:27:40
Twitter Icon @softek_jp Cisco NX-OS の system login block-for コマンドの処理にサービスを妨害される問題 (CVE-2021-1590) [39803] sid.softek.jp/content/show/3… #SIDfm #脆弱性情報 2021-08-26 07:42:48
© CVE.report 2023 Twitter Nitter Twitter Viewer |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

CVE.report and Source URL Uptime Status status.cve.report