ID

VAR-202109-0758


CVE

CVE-2021-34697


TITLE

Cisco Systems  Cisco IOS XE  Initialization vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-021238

DESCRIPTION

A vulnerability in the Protection Against Distributed Denial of Service Attacks feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to conduct denial of service (DoS) attacks to or through the affected device. This vulnerability is due to incorrect programming of the half-opened connections limit, TCP SYN flood limit, or TCP SYN cookie features when the features are configured in vulnerable releases of Cisco IOS XE Software. An attacker could exploit this vulnerability by attempting to flood traffic to or through the affected device. A successful exploit could allow the attacker to initiate a DoS attack to or through an affected device. Cisco Systems Cisco IOS XE Has an initialization vulnerability.Service operation interruption (DoS) It may be in a state. Pillow is a Python-based image processing library. There is currently no information about this vulnerability, please feel free to follow CNNVD or manufacturer announcements

Trust: 2.34

sources: NVD: CVE-2021-34697 // JVNDB: JVNDB-2021-021238 // CNNVD: CNNVD-202104-975 // VULHUB: VHN-394939 // VULMON: CVE-2021-34697

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:ltversion:17.3.3

Trust: 1.0

vendor:ciscomodel:ios xescope:gteversion:17.3.1

Trust: 1.0

vendor:シスコシステムズmodel:cisco ios xescope:eqversion:17.3.1 that's all 17.3.3

Trust: 0.8

vendor:シスコシステムズmodel:cisco ios xescope:eqversion: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-021238 // NVD: CVE-2021-34697

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-34697
value: HIGH

Trust: 1.0

ykramarz@cisco.com: CVE-2021-34697
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-34697
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202104-975
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-202109-1569
value: HIGH

Trust: 0.6

VULHUB: VHN-394939
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-34697
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-394939
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-34697
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 1.0

ykramarz@cisco.com: CVE-2021-34697
baseSeverity: MEDIUM
baseScore: 5.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: LOW
exploitabilityScore: 3.9
impactScore: 1.4
version: 3.1

Trust: 1.0

NVD: CVE-2021-34697
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-394939 // JVNDB: JVNDB-2021-021238 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202109-1569 // NVD: CVE-2021-34697 // NVD: CVE-2021-34697

PROBLEMTYPE DATA

problemtype:CWE-665

Trust: 1.1

problemtype:Improper initialization (CWE-665) [NVD evaluation ]

Trust: 0.8

sources: VULHUB: VHN-394939 // JVNDB: JVNDB-2021-021238 // NVD: CVE-2021-34697

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202109-1569

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202104-975

PATCH

title:cisco-sa-zbfw-tguGuYqurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-zbfw-tguGuYq

Trust: 0.8

title:Cisco IOS XE Software Fixes for code issue vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=164618

Trust: 0.6

sources: JVNDB: JVNDB-2021-021238 // CNNVD: CNNVD-202109-1569

EXTERNAL IDS

db:NVDid:CVE-2021-34697

Trust: 3.4

db:JVNDBid:JVNDB-2021-021238

Trust: 0.8

db:CS-HELPid:SB2021041363

Trust: 0.6

db:CNNVDid:CNNVD-202104-975

Trust: 0.6

db:CS-HELPid:SB2021092417

Trust: 0.6

db:AUSCERTid:ESB-2021.3180

Trust: 0.6

db:CNNVDid:CNNVD-202109-1569

Trust: 0.6

db:VULHUBid:VHN-394939

Trust: 0.1

db:VULMONid:CVE-2021-34697

Trust: 0.1

sources: VULHUB: VHN-394939 // VULMON: CVE-2021-34697 // JVNDB: JVNDB-2021-021238 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202109-1569 // NVD: CVE-2021-34697

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-zbfw-tguguyq

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-34697

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021041363

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-ios-xe-denial-of-service-via-ddos-protection-36514

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021092417

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3180

Trust: 0.6

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-394939 // VULMON: CVE-2021-34697 // JVNDB: JVNDB-2021-021238 // CNNVD: CNNVD-202104-975 // CNNVD: CNNVD-202109-1569 // NVD: CVE-2021-34697

SOURCES

db:VULHUBid:VHN-394939
db:VULMONid:CVE-2021-34697
db:JVNDBid:JVNDB-2021-021238
db:CNNVDid:CNNVD-202104-975
db:CNNVDid:CNNVD-202109-1569
db:NVDid:CVE-2021-34697

LAST UPDATE DATE

2024-08-14T12:42:29.600000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-394939date:2021-10-05T00:00:00
db:VULMONid:CVE-2021-34697date:2021-09-23T00:00:00
db:JVNDBid:JVNDB-2021-021238date:2024-07-23T01:58:00
db:CNNVDid:CNNVD-202104-975date:2021-04-14T00:00:00
db:CNNVDid:CNNVD-202109-1569date:2021-10-08T00:00:00
db:NVDid:CVE-2021-34697date:2023-11-07T03:36:05.180

SOURCES RELEASE DATE

db:VULHUBid:VHN-394939date:2021-09-23T00:00:00
db:VULMONid:CVE-2021-34697date:2021-09-23T00:00:00
db:JVNDBid:JVNDB-2021-021238date:2024-07-23T00:00:00
db:CNNVDid:CNNVD-202104-975date:2021-04-13T00:00:00
db:CNNVDid:CNNVD-202109-1569date:2021-09-22T00:00:00
db:NVDid:CVE-2021-34697date:2021-09-23T03:15:16.107