A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition.
The vulnerability is due to an unknown condition in the Autonomic Networking code of the affected software. An attacker could exploit this vulnerability by replaying captured packets to reset the Autonomic Control Plane (ACP) channel of an affected system. A successful exploit could allow the attacker to reset the ACP channel of an affected system and consequently cause the affected device to reload, resulting in a DoS condition.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2uXm2uO A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition.
The vulnerability is due to an unknown condition in the Autonomic Networking code of the affected software. An attacker could exploit this vulnerability by replaying captured packets to reset the Autonomic Control Plane (ACP) channel of an affected system. A successful exploit could allow the attacker to reset the ACP channel of an affected system and consequently cause the affected device to reload, resulting in a DoS condition.
Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://ift.tt/2uXm2uO
Security Impact Rating: High
CVE: CVE-2017-6663
from Cisco Security Advisory http://ift.tt/2uXm2uO
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.