The vulnerability is due to the improper implementation of PACL logic for ACEs that include a greater than operator, a less than operator, a tcp flag, the established keyword, or the range keyword. An attacker could exploit this vulnerability by sending packets that meet one or more filter criteria through an affected device. A successful exploit could allow the attacker to bypass the filters defined in the PACL for a targeted system.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2dtQpip
The vulnerability is due to the improper implementation of PACL logic for ACEs that include a greater than operator, a less than operator, a tcp flag, the established keyword, or the range keyword. An attacker could exploit this vulnerability by sending packets that meet one or more filter criteria through an affected device. A successful exploit could allow the attacker to bypass the filters defined in the PACL for a targeted system.
Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2dtQpip
Security Impact Rating: Medium
CVE: CVE-2016-6422
from Cisco Security Advisory http://ift.tt/2dtQpip
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.