You are here
Home > Preporuke > Ranjivost ANI značajke u Cisco IOS i Cisco IOS XE softveru

Ranjivost ANI značajke u Cisco IOS i Cisco IOS XE softveru

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco IOS and IOS XE Software Autonomic Networking Infrastructure Denial of Service Vulnerability

Advisory ID: cisco-sa-20170726-anidos

Revision: 1.0

For Public Release: 2017 July 26 16:00 GMT

Last Updated: 2017 July 26 16:00 GMT

CVE ID(s): CVE-2017-6663

CVSS Score v(3): 7.4 CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary
=======
A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition.

The vulnerability is due to an unknown condition in the Autonomic Networking code of the affected software. An attacker could exploit this vulnerability by replaying captured packets to reset the Autonomic Control Plane (ACP) channel of an affected system. A successful exploit could allow the attacker to reset the ACP channel of an affected system and consequently cause the affected device to reload, resulting in a DoS condition.

Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos”]

—–BEGIN PGP SIGNATURE—–
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=rimL
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-07-0183-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Sigurnosni nedostaci jezgre operacijskog sustava

Otkriveni su sigurnosni nedostaci u jezgri operacijskog sustava Fedora. Otkriveni nedostaci potencijalnim napadačima omogućuju rušenje servisa, stjecanje uvećanih ovlasti te...

Close