7.4
HIGH
CVE-2021-34714
"Cisco FXOS/Cisco IOS/Cisco NX-OS Denial of Service (DoS) Vulnerability"
Description

A vulnerability in the Unidirectional Link Detection (UDLD) feature of Cisco FXOS Software, Cisco IOS Software, Cisco IOS XE Software, Cisco IOS XR Software, and Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause an affected device to reload. This vulnerability is due to improper input validation of the UDLD packets. An attacker could exploit this vulnerability by sending specifically crafted UDLD packets to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: The UDLD feature is disabled by default, and the conditions to exploit this vulnerability are strict. An attacker must have full control of a directly connected device. On Cisco IOS XR devices, the impact is limited to the reload of the UDLD process.

INFO

Published Date :

Sept. 23, 2021, 3:15 a.m.

Last Modified :

Nov. 21, 2024, 6:11 a.m.

Remotely Exploitable :

No

Impact Score :

4.0

Exploitability Score :

2.8
Affected Products

The following products are affected by CVE-2021-34714 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Cisco ios_xe
2 Cisco ios
3 Cisco nx-os
4 Cisco firepower_extensible_operating_system
5 Cisco fxos
6 Cisco ios_xr
7 Cisco mds_9000
8 Cisco nexus_7000
9 Cisco nexus_7000_10-slot
10 Cisco nexus_7000_18-slot
11 Cisco nexus_7000_9-slot
12 Cisco nexus_5000
13 Cisco nexus_3000
14 Cisco nexus_5010
15 Cisco nexus_5020
16 Cisco nexus_5548p
17 Cisco nexus_5548up
18 Cisco nexus_5596up
19 Cisco nexus_3016q
20 Cisco nexus_3048
21 Cisco nexus_3064t
22 Cisco nexus_3064x
23 Cisco nexus_3548
24 Cisco mds_9100
25 Cisco nexus_9000
26 Cisco nexus_5596t
27 Cisco nexus_56128p
28 Cisco nexus_5672up
29 Cisco nexus_6001
30 Cisco nexus_6004
31 Cisco nexus_6004x
32 Cisco nexus_3016
33 Cisco nexus_3064
34 Cisco nexus_3064-32t
35 Cisco nexus_3064-t
36 Cisco nexus_3064-x
37 Cisco nexus_3100
38 Cisco nexus_3100-v
39 Cisco nexus_3100-z
40 Cisco nexus_3100v
41 Cisco nexus_31108pc-v
42 Cisco nexus_31108pv-v
43 Cisco nexus_31108tc-v
44 Cisco nexus_31128pq
45 Cisco nexus_3132c-z
46 Cisco nexus_3132q
47 Cisco nexus_3132q-v
48 Cisco nexus_3132q-x
49 Cisco nexus_3132q-x\/3132q-xl
50 Cisco nexus_3132q-xl
51 Cisco nexus_3164q
52 Cisco nexus_3172
53 Cisco nexus_3172pq
54 Cisco nexus_3172pq-xl
55 Cisco nexus_3172pq\/pq-xl
56 Cisco nexus_3172tq
57 Cisco nexus_3172tq-32t
58 Cisco nexus_3172tq-xl
59 Cisco nexus_3200
60 Cisco nexus_3232c
61 Cisco nexus_3232c_
62 Cisco nexus_3264c-e
63 Cisco nexus_3264q
64 Cisco nexus_3400
65 Cisco nexus_3408-s
66 Cisco nexus_34180yc
67 Cisco nexus_34200yc-sm
68 Cisco nexus_3432d-s
69 Cisco nexus_3464c
70 Cisco nexus_3500
71 Cisco nexus_3524
72 Cisco nexus_3524-x
73 Cisco nexus_3524-x\/xl
74 Cisco nexus_3524-xl
75 Cisco nexus_3548-x
76 Cisco nexus_3548-x\/xl
77 Cisco nexus_3548-xl
78 Cisco nexus_3600
79 Cisco nexus_36180yc-r
80 Cisco nexus_3636c-r
81 Cisco nexus_9000v
82 Cisco nexus_9200
83 Cisco nexus_92160yc-x
84 Cisco nexus_9221c
85 Cisco nexus_92300yc
86 Cisco nexus_92304qc
87 Cisco nexus_92348gc-x
88 Cisco nexus_9236c
89 Cisco nexus_9272q
90 Cisco nexus_9300
91 Cisco nexus_93108tc-ex
92 Cisco nexus_93108tc-ex-24
93 Cisco nexus_93108tc-fx
94 Cisco nexus_93108tc-fx-24
95 Cisco nexus_93108tc-fx3p
96 Cisco nexus_93120tx
97 Cisco nexus_93128
98 Cisco nexus_93128tx
99 Cisco nexus_9316d-gx
100 Cisco nexus_93180lc-ex
101 Cisco nexus_93180tc-ex
102 Cisco nexus_93180yc-ex
103 Cisco nexus_93180yc-ex-24
104 Cisco nexus_93180yc-fx
105 Cisco nexus_93180yc-fx-24
106 Cisco nexus_93180yc-fx3
107 Cisco nexus_93180yc-fx3s
108 Cisco nexus_93216tc-fx2
109 Cisco nexus_93240yc-fx2
110 Cisco nexus_9332c
111 Cisco nexus_9332pq
112 Cisco nexus_93360yc-fx2
113 Cisco nexus_9336c-fx2
114 Cisco nexus_9336c-fx2-e
115 Cisco nexus_9336pq
116 Cisco nexus_9336pq_aci_spine
117 Cisco nexus_9348gc-fxp
118 Cisco nexus_93600cd-gx
119 Cisco nexus_9364c
120 Cisco nexus_9364c-gx
121 Cisco nexus_9372px
122 Cisco nexus_9372px-e
123 Cisco nexus_9372tx
124 Cisco nexus_9372tx-e
125 Cisco nexus_9396px
126 Cisco nexus_9396tx
127 Cisco nexus_9500
128 Cisco nexus_9500_supervisor_a
129 Cisco nexus_9500_supervisor_a\+
130 Cisco nexus_9500_supervisor_b
131 Cisco nexus_9500_supervisor_b\+
132 Cisco nexus_9500r
133 Cisco nexus_9504
134 Cisco nexus_9508
135 Cisco nexus_9516
136 Cisco nexus_5624q
137 Cisco nexus_5648q
138 Cisco nexus_5696q
139 Cisco nexus_7700
140 Cisco ucs_6248up
141 Cisco ucs_6296up
142 Cisco ucs_6324
143 Cisco ucs_6332
144 Cisco ucs_6332-16up
145 Cisco nexus_7000_4-slot
146 Cisco nexus_7000_supervisor_1
147 Cisco nexus_7000_supervisor_2
148 Cisco nexus_7000_supervisor_2e
149 Cisco nexus_7004
150 Cisco nexus_7009
151 Cisco nexus_7010
152 Cisco nexus_7018
153 Cisco nexus_7700_10-slot
154 Cisco nexus_7700_18-slot
155 Cisco nexus_7700_2-slot
156 Cisco nexus_7700_6-slot
157 Cisco nexus_7700_supervisor_2e
158 Cisco nexus_7700_supervisor_3e
159 Cisco nexus_7702
160 Cisco nexus_7706
161 Cisco nexus_7710
162 Cisco nexus_7718
163 Cisco mds_9132t
164 Cisco mds_9134
165 Cisco mds_9140
166 Cisco mds_9148
167 Cisco mds_9148s
168 Cisco mds_9148t
169 Cisco mds_9200
170 Cisco mds_9216
171 Cisco mds_9216a
172 Cisco mds_9216i
173 Cisco mds_9222i
174 Cisco mds_9250i
175 Cisco mds_9396s
176 Cisco mds_9396t
177 Cisco mds_9500
178 Cisco mds_9506
179 Cisco mds_9509
180 Cisco mds_9513
181 Cisco mds_9700
182 Cisco mds_9706
183 Cisco mds_9710
184 Cisco mds_9718
185 Cisco nexus_9000_in_aci_mode
186 Cisco nexus_9000_in_standalone
187 Cisco nexus_9000_in_standalone_nx-os_mode
188 Cisco nexus_5500
189 Cisco nexus_5600
190 Cisco nexus_5672up-16g
191 Cisco firepower_4110
192 Cisco firepower_4112
193 Cisco firepower_4115
194 Cisco firepower_4120
195 Cisco firepower_4125
196 Cisco firepower_4140
197 Cisco firepower_4145
198 Cisco firepower_4150
199 Cisco firepower_9300
200 Cisco nexus_3500_platform
201 Cisco nexus_6000
202 Cisco firepower_4100
203 Cisco ucs_6200
204 Cisco ucs_6300
205 Cisco nexus_6001p
206 Cisco nexus_6001t
207 Cisco ucs_6400
208 Cisco firepower_9300_with_1_sm-24_module
209 Cisco firepower_9300_with_1_sm-36_module
210 Cisco firepower_9300_with_1_sm-44_module
211 Cisco firepower_9300_with_3_sm-44_module
212 Cisco ucs_6248_up_fabric_interconnect
213 Cisco ucs_6296_up_fabric_interconnect
214 Cisco ucs_6324_fabric_interconnect
215 Cisco ucs_6332-16up_fabric_interconnect
216 Cisco ucs_6332_fabric_interconnect
217 Cisco ucs_6454
218 Cisco firepower_9300_sm-24
219 Cisco firepower_9300_sm-36
220 Cisco firepower_9300_sm-40
221 Cisco firepower_9300_sm-44
222 Cisco firepower_9300_sm-44_x_3
223 Cisco firepower_9300_sm-48
224 Cisco firepower_9300_sm-56
225 Cisco firepower_9300_sm-56_x_3
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2021-34714.

URL Resource
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ Vendor Advisory

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2021-34714 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2021-34714 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • CVE Modified by af854a3a-2127-422b-91ae-364da2661108

    Nov. 21, 2024

    Action Type Old Value New Value
    Added Reference https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ
  • CVE Modified by [email protected]

    May. 14, 2024

    Action Type Old Value New Value
  • CVE Modified by [email protected]

    Nov. 07, 2023

    Action Type Old Value New Value
    Removed CVSS V3 Cisco Systems, Inc. AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
    Added CVSS V3.1 Cisco Systems, Inc. AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
  • CPE Deprecation Remap by [email protected]

    Apr. 20, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions from (including) 3.2(3o)a OR *cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* versions from (including) 3.2(3o)a
  • CPE Deprecation Remap by [email protected]

    Apr. 20, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions from (including) 4.1(1a)a OR *cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* versions from (including) 4.1(1a)a
  • CPE Deprecation Remap by [email protected]

    Apr. 20, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions from (including) 8.4(3.115) OR *cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* versions from (including) 8.4(3.115)
  • CPE Deprecation Remap by [email protected]

    Apr. 20, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions from (including) 7.0(3)i7(9) OR *cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* versions from (including) 7.0(3)i7(9)
  • CPE Deprecation Remap by [email protected]

    Apr. 20, 2023

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions from (including) 7.3(8)n1(1) OR *cpe:2.3:o:cisco:firepower_extensible_operating_system:*:*:*:*:*:*:*:* versions from (including) 7.3(8)n1(1)
  • CPE Deprecation Remap by [email protected]

    Oct. 27, 2022

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 7.3(8)n1(1) OR *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 7.3(8)n1(1)
  • CPE Deprecation Remap by [email protected]

    Oct. 27, 2022

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 3.2(3o)a OR *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 3.2(3o)a
  • CPE Deprecation Remap by [email protected]

    Oct. 27, 2022

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 4.1(1a)a OR *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 4.1(1a)a
  • CPE Deprecation Remap by [email protected]

    Oct. 27, 2022

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 7.0(3)i7(9) OR *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 7.0(3)i7(9)
  • CPE Deprecation Remap by [email protected]

    Oct. 27, 2022

    Action Type Old Value New Value
    Changed CPE Configuration OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 8.4(3.115) OR *cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:* versions from (including) 8.4(3.115)
  • Initial Analysis by [email protected]

    Oct. 13, 2021

    Action Type Old Value New Value
    Added CVSS V2 NIST (AV:A/AC:M/Au:N/C:N/I:N/A:C)
    Added CVSS V3.1 NIST AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
    Changed Reference Type https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ No Types Assigned https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-nxos-xr-udld-dos-W5hGHgtQ Vendor Advisory
    Added CWE NIST CWE-20
    Added CPE Configuration AND OR *cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:* versions from (including) 2.2 up to (excluding) 2.2.2.148 *cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:* versions from (including) 2.3 up to (excluding) 2.3.1.216 *cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:* versions from (including) 2.4 up to (excluding) 2.4.1.273 *cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:* versions from (including) 2.6 up to (excluding) 2.6.1.224 *cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:* versions from (including) 2.7 up to (excluding) 2.7.1.143 *cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:* versions from (including) 2.8 up to (excluding) 2.8.1.143 *cpe:2.3:o:cisco:fxos:*:*:*:*:*:*:*:* versions from (including) 2.9 up to (excluding) 2.9.1.135 OR cpe:2.3:h:cisco:firepower_4100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4110:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4112:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4115:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4120:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4125:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4140:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4145:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_4150:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_sm-24:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_sm-36:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_sm-40:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_sm-44:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_sm-44_x_3:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_sm-48:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_sm-56:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_sm-56_x_3:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_with_1_sm-24_module:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_with_1_sm-36_module:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_with_1_sm-44_module:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:firepower_9300_with_3_sm-44_module:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 8.4\(3.115\) *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions up to (including) 8.4\(3.115\) *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 8.4\(3.115\) *cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* versions up to (including) 8.4\(3.115\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (including) 8.4\(3.115\) OR cpe:2.3:h:cisco:mds_9000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9132t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9134:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9140:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9148:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9148s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9148t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9200:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9216:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9216a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9216i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9222i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9250i:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9396s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9396t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9500:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9506:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9509:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9513:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9700:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9706:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9710:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:mds_9718:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_10-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_18-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_4-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_9-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_supervisor_1:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_supervisor_2:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7000_supervisor_2e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7004:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7009:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7010:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7018:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7700:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7700_10-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7700_18-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7700_2-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7700_6-slot:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7700_supervisor_2e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7700_supervisor_3e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7702:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7706:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7710:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_7718:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 7.0\(3\)i7\(9\) *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions up to (including) 7.0\(3\)i7\(9\) *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 7.0\(3\)i7\(9\) *cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* versions up to (including) 7.0\(3\)i7\(9\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (including) 7.0\(3\)i7\(9\) OR cpe:2.3:h:cisco:nexus_3000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3016:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3016q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3048:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3064:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3064-32t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3064-t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3064-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3064t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3064x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3100:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3100-v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3100-z:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3100v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_31108pc-v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_31108pv-v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_31108tc-v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_31128pq:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3132c-z:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3132q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3132q-v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3132q-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3132q-x\/3132q-xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3132q-xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3164q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3172:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3172pq:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3172pq-xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3172pq\/pq-xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3172tq:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3172tq-32t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3172tq-xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3200:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3232c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3232c_:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3264c-e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3264q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3400:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3408-s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_34180yc:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_34200yc-sm:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3432d-s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3464c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3500:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3500_platform:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3524:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3524-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3524-x\/xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3524-xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3548:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3548-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3548-x\/xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3548-xl:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3600:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_36180yc-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_3636c-r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9000_in_aci_mode:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9000_in_standalone:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9000_in_standalone_nx-os_mode:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9000v:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9200:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_92160yc-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9221c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_92300yc:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_92304qc:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_92348gc-x:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9236c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9272q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9300:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93108tc-ex:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93108tc-ex-24:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93108tc-fx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93108tc-fx-24:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93108tc-fx3p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93120tx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93128:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93128tx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9316d-gx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93180lc-ex:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93180tc-ex:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93180yc-ex:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93180yc-ex-24:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93180yc-fx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93180yc-fx-24:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93180yc-fx3:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93180yc-fx3s:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93216tc-fx2:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93240yc-fx2:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9332c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9332pq:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93360yc-fx2:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9336c-fx2:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9336c-fx2-e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9336pq:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9336pq_aci_spine:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9348gc-fxp:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_93600cd-gx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9364c:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9364c-gx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9372px:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9372px-e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9372tx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9372tx-e:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9396px:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9396tx:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9500:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9500_supervisor_a:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9500_supervisor_a\+:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9500_supervisor_b:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9500_supervisor_b\+:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9500r:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9504:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9508:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_9516:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 7.3\(8\)n1\(1\) *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions up to (including) 7.3\(8\)n1\(1\) *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 7.3\(8\)n1\(1\) *cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* versions up to (including) 7.3\(8\)n1\(1\) *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (including) 7.3\(8\)n1\(1\) OR cpe:2.3:h:cisco:nexus_5000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5010:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5020:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5500:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5548p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5548up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5596t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5596up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5600:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_56128p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5624q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5648q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5672up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5672up-16g:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_5696q:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_6000:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_6001:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_6001p:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_6001t:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_6004:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:nexus_6004x:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 3.2\(3o\)a *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions up to (including) 3.2\(3o\)a *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 3.2\(3o\)a *cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* versions up to (including) 3.2\(3o\)a *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (including) 3.2\(3o\)a OR cpe:2.3:h:cisco:ucs_6200:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6248_up_fabric_interconnect:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6248up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6296_up_fabric_interconnect:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6296up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6300:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6324:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6324_fabric_interconnect:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6332:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6332-16up:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6332-16up_fabric_interconnect:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6332_fabric_interconnect:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:a:cisco:ios_xe:*:*:*:*:*:*:*:* versions up to (including) 4.1\(1a\)a *cpe:2.3:o:cisco:fx-os:*:*:*:*:*:*:*:* versions up to (including) 4.1\(1a\)a *cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:* versions up to (including) 4.1\(1a\)a *cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:* versions up to (including) 4.1\(1a\)a *cpe:2.3:o:cisco:nx-os:*:*:*:*:*:*:*:* versions up to (including) 3.2\(3o\)a OR cpe:2.3:h:cisco:ucs_6400:-:*:*:*:*:*:*:* cpe:2.3:h:cisco:ucs_6454:-:*:*:*:*:*:*:*
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2021-34714 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2021-34714 weaknesses.

CAPEC-3: Using Leading 'Ghost' Character Sequences to Bypass Input Filters Using Leading 'Ghost' Character Sequences to Bypass Input Filters CAPEC-7: Blind SQL Injection Blind SQL Injection CAPEC-8: Buffer Overflow in an API Call Buffer Overflow in an API Call CAPEC-9: Buffer Overflow in Local Command-Line Utilities Buffer Overflow in Local Command-Line Utilities CAPEC-10: Buffer Overflow via Environment Variables Buffer Overflow via Environment Variables CAPEC-13: Subverting Environment Variable Values Subverting Environment Variable Values CAPEC-14: Client-side Injection-induced Buffer Overflow Client-side Injection-induced Buffer Overflow CAPEC-22: Exploiting Trust in Client Exploiting Trust in Client CAPEC-23: File Content Injection File Content Injection CAPEC-24: Filter Failure through Buffer Overflow Filter Failure through Buffer Overflow CAPEC-28: Fuzzing Fuzzing CAPEC-31: Accessing/Intercepting/Modifying HTTP Cookies Accessing/Intercepting/Modifying HTTP Cookies CAPEC-42: MIME Conversion MIME Conversion CAPEC-43: Exploiting Multiple Input Interpretation Layers Exploiting Multiple Input Interpretation Layers CAPEC-45: Buffer Overflow via Symbolic Links Buffer Overflow via Symbolic Links CAPEC-46: Overflow Variables and Tags Overflow Variables and Tags CAPEC-47: Buffer Overflow via Parameter Expansion Buffer Overflow via Parameter Expansion CAPEC-52: Embedding NULL Bytes Embedding NULL Bytes CAPEC-53: Postfix, Null Terminate, and Backslash Postfix, Null Terminate, and Backslash CAPEC-63: Cross-Site Scripting (XSS) Cross-Site Scripting (XSS) CAPEC-64: Using Slashes and URL Encoding Combined to Bypass Validation Logic Using Slashes and URL Encoding Combined to Bypass Validation Logic CAPEC-67: String Format Overflow in syslog() String Format Overflow in syslog() CAPEC-71: Using Unicode Encoding to Bypass Validation Logic Using Unicode Encoding to Bypass Validation Logic CAPEC-72: URL Encoding URL Encoding CAPEC-73: User-Controlled Filename User-Controlled Filename CAPEC-78: Using Escaped Slashes in Alternate Encoding Using Escaped Slashes in Alternate Encoding CAPEC-79: Using Slashes in Alternate Encoding Using Slashes in Alternate Encoding CAPEC-80: Using UTF-8 Encoding to Bypass Validation Logic Using UTF-8 Encoding to Bypass Validation Logic CAPEC-81: Web Server Logs Tampering Web Server Logs Tampering CAPEC-83: XPath Injection XPath Injection CAPEC-85: AJAX Footprinting AJAX Footprinting CAPEC-88: OS Command Injection OS Command Injection CAPEC-101: Server Side Include (SSI) Injection Server Side Include (SSI) Injection CAPEC-104: Cross Zone Scripting Cross Zone Scripting CAPEC-108: Command Line Execution through SQL Injection Command Line Execution through SQL Injection CAPEC-109: Object Relational Mapping Injection Object Relational Mapping Injection CAPEC-110: SQL Injection through SOAP Parameter Tampering SQL Injection through SOAP Parameter Tampering CAPEC-120: Double Encoding Double Encoding CAPEC-135: Format String Injection Format String Injection CAPEC-136: LDAP Injection LDAP Injection CAPEC-153: Input Data Manipulation Input Data Manipulation CAPEC-182: Flash Injection Flash Injection CAPEC-209: XSS Using MIME Type Mismatch XSS Using MIME Type Mismatch CAPEC-230: Serialized Data with Nested Payloads Serialized Data with Nested Payloads CAPEC-231: Oversized Serialized Data Payloads Oversized Serialized Data Payloads CAPEC-250: XML Injection XML Injection CAPEC-261: Fuzzing for garnering other adjacent user/sensitive data Fuzzing for garnering other adjacent user/sensitive data CAPEC-267: Leverage Alternate Encoding Leverage Alternate Encoding CAPEC-473: Signature Spoof Signature Spoof CAPEC-588: DOM-Based XSS DOM-Based XSS CAPEC-664: Server Side Request Forgery Server Side Request Forgery
Exploit Prediction

EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days.

0.06 }} 0.01%

score

0.24744

percentile

CVSS31 - Vulnerability Scoring System
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability