{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-11T21:05:04.366","vulnerabilities":[{"cve":{"id":"CVE-2024-20371","sourceIdentifier":"psirt@cisco.com","published":"2024-11-06T17:15:14.187","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A vulnerability in the access control list (ACL) programming of Cisco Nexus 3550-F Switches could allow an unauthenticated, remote attacker to send traffic that should be blocked to the management interface of an affected device.&nbsp;\r\n\r\nThis vulnerability exists because ACL deny rules are not properly enforced at the time of device reboot. An attacker could exploit this vulnerability by attempting to send traffic to the management interface of an affected device. A successful exploit could allow the attacker to send traffic to the management interface of the affected device."},{"lang":"es","value":"Una vulnerabilidad en la programación de la lista de control de acceso (ACL) de los conmutadores Cisco Nexus 3550-F podría permitir que un atacante remoto no autenticado envíe tráfico que debería estar bloqueado a la interfaz de administración de un dispositivo afectado. Esta vulnerabilidad existe porque las reglas de denegación de ACL no se aplican correctamente en el momento del reinicio del dispositivo. Un atacante podría aprovechar esta vulnerabilidad al intentar enviar tráfico a la interfaz de administración de un dispositivo afectado. Una explotación exitosa podría permitir al atacante enviar tráfico a la interfaz de administración del dispositivo afectado."}],"metrics":{"cvssMetricV31":[{"source":"psirt@cisco.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N","baseScore":5.3,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"LOW","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":1.4}]},"weaknesses":[{"source":"psirt@cisco.com","type":"Secondary","description":[{"lang":"en","value":"CWE-264"}]}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-3550-acl-bypass-mhskZc2q","source":"psirt@cisco.com"}]}}]}