You are here
Home > Preporuke > Ranjivost Secure Shell (SSH) podsustava Cisco Small Business Managed Switches softvera

Ranjivost Secure Shell (SSH) podsustava Cisco Small Business Managed Switches softvera

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco Small Business Managed Switches Denial of Service Vulnerability

Advisory ID: cisco-sa-20170920-sbms

Revision: 1.0

For Public Release: 2017 September 20 16:00 GMT

Last Updated: 2017 September 20 16:00 GMT

CVE ID(s): CVE-2017-6720

CVSS Score v(3): 7.7 CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary
=======
A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition.

The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170920-sbms”]

—–BEGIN PGP SIGNATURE—–
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=cpqP
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-09-0042-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost Cisco AsyncOS softvera za Cisco Email Security Appliances

Otkrivena je ranjivosti u značajki za filtriranje email poruka Cisco AsyncOS softvera za Cisco Email Security Appliances. Ranjivost je uzrokovana...

Close