The vulnerability is due to implementation details of how system credentials are verified by the affected software. An attacker could exploit this vulnerability by using a combination of valid system logins, invalid system logins, and time variability to try to continuously authenticate to a device. An exploit could allow the attacker to obtain a list of valid system usernames. The list contains valid usernames only. The list does not contain any associated passwords.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link: http://ift.tt/1Y1K5hn
The vulnerability is due to implementation details of how system credentials are verified by the affected software. An attacker could exploit this vulnerability by using a combination of valid system logins, invalid system logins, and time variability to try to continuously authenticate to a device. An exploit could allow the attacker to obtain a list of valid system usernames. The list contains valid usernames only. The list does not contain any associated passwords.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link: http://ift.tt/1Y1K5hn
Security Impact Rating: Medium
CVE: CVE-2016-1356
from Cisco Security Advisory http://ift.tt/1Y1K5hn
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.