The vulnerability occurs because the software forwards Layer 2 frames that should be consumed by the first hop. An attacker could exploit this vulnerability by injecting the Layer 2 frame into the network segment. An exploit could allow the attacker to cause a Layer 2 network storm and impact the availability of the switches.
There are workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2hgUtpX
The vulnerability occurs because the software forwards Layer 2 frames that should be consumed by the first hop. An attacker could exploit this vulnerability by injecting the Layer 2 frame into the network segment. An exploit could allow the attacker to cause a Layer 2 network storm and impact the availability of the switches.
There are workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2hgUtpX
Security Impact Rating: Medium
CVE: CVE-2016-6473
from Cisco Security Advisory http://ift.tt/2hgUtpX
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.