Title
CVE-2021-27861: CISCO
Tags
CISCO, IOS
CVE
CVE-2021-27861
NVD Description
Layer 2 network filtering capabilities such as IPv6 RA guard can be bypassed using LLC/SNAP headers with invalid length(and optionally VLAN0 headers)
Exploit Available
True
Abused by Malware
False
You can find more insights and intelligence on this CVE at: https://vi.loginsoft.com/app/cve/CVE-2021-27861
Vulnerable Condition
To ascertain the vulnerable conditions and product versions deemed affected, issue the following commands and look for its associated as stated. If one more conditions matches then we can consider it as affected.
Command Instructions:
COMMAND:
show version
STDOUT:
Cisco IOS Software
COMMAND:
show version
STDOUT:
WS-C65[0-9]{2}
COMMAND:
show version
STDOUT:
WS-C68[0-9]{2}
COMMAND:
show version
STDOUT:
WS-C3650-[0-9]{1,2}
COMMAND:
show version
STDOUT:
WS-C3850-[0-9]{2}
COMMAND:
show version
STDOUT:
C9200[d]
COMMAND:
show version
STDOUT:
C9300[d]
COMMAND:
show version
STDOUT:
C9400[d]
COMMAND:
show version
STDOUT:
C9500[d]
COMMAND:
show version
STDOUT:
C9600[d]
Affected Versions:
15.5(01.01.85)SY07
15.2(07)E02
Get in touch with us to explore how our Security Content Suite can optimize vulnerability management for your needs.
Explore the key security, speed, and performance differences between TLS 1.3 and TLS 1.2
Ready to Find and Fix Your Security Weak Points?
LoginSoft's cybersecurity experts help organizations conduct thorough gap analyses, build prioritized remediation roadmaps, and achieve measurable security maturity improvements.
Schedule a Security Assessment
Hari Charan
A MESSAGE FROM OUR TECHNOLOGY LEADER
The NVD enrichment cutback is not a surprise to us - it’s the inflection point we’ve been preparing for. At Loginsoft, we’ve spent years building the research depth and tooling infrastructure to independently enrich vulnerabilities at scale, with the accuracy and context modern security programs require. LOVI is our answer. Our mission is simple: ensure that no CVE relevant to your environment goes unanalyzed, unscored, or unactioned - regardless of what remains in NIST’s queue.
Get Notified
BLOGS AND RESOURCES



