CVE-2021-1368

8.8 HIGH

📋 TL;DR

A vulnerability in Cisco FXOS and NX-OS software's UDLD feature allows unauthenticated adjacent attackers to execute arbitrary code with admin privileges or cause denial of service. Attackers need direct network access and specific configurations to exploit. This affects Cisco devices running vulnerable software versions.

💻 Affected Systems

Products:
  • Cisco FXOS Software
  • Cisco NX-OS Software
Versions: Multiple versions - see Cisco advisory for specific affected versions
Operating Systems: Cisco FXOS, Cisco NX-OS
Default Config Vulnerable: ✅ No
Notes: UDLD feature is disabled by default. Requires UDLD-enabled port channel and specific system conditions for full RCE exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Arbitrary code execution with administrative privileges leading to complete device compromise

🟠

Likely Case

Denial of service causing device reload and service disruption

🟢

If Mitigated

No impact if UDLD is disabled or proper network segmentation is in place

🌐 Internet-Facing: LOW - Requires adjacent attacker with direct network access, not remote exploitation
🏢 Internal Only: MEDIUM - Requires attacker to control adjacent device and specific port channel configuration

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: HIGH

Exploitation requires: 1) Adjacent attacker with direct connection, 2) UDLD-enabled port channel, 3) Specific system conditions for RCE (otherwise only DoS)

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Multiple fixed versions - refer to Cisco advisory for specific product fixes

Vendor Advisory: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-nxos-udld-rce-xetH6w35

Restart Required: Yes

Instructions:

1. Check Cisco advisory for affected product versions. 2. Download and apply appropriate software update. 3. Reload device to activate patched software.

🔧 Temporary Workarounds

Disable UDLD

all

Disable the UDLD feature on all interfaces and port channels

no udld enable
no udld aggressive

Network Segmentation

all

Implement strict network segmentation to limit adjacent device access

🧯 If You Can't Patch

  • Disable UDLD feature on all interfaces and port channels
  • Implement strict access controls and network segmentation to limit adjacent device access

🔍 How to Verify

Check if Vulnerable:

Check if UDLD is enabled: 'show udld' and verify software version against Cisco advisory

Check Version:

show version

Verify Fix Applied:

Verify software version is updated to fixed version and UDLD is disabled or patched

📡 Detection & Monitoring

Log Indicators:

  • UDLD process crashes
  • Device reloads
  • Unusual UDLD protocol packets

Network Indicators:

  • Malformed UDLD packets
  • UDLD protocol anomalies

SIEM Query:

Search for: 'UDLD crash', 'device reload', 'CVE-2021-1368' in system logs

🔗 References

📤 Share & Export