Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-6vwv-6hmx-54hh

Опубликовано: 27 мар. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 8.6

Описание

A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading.

This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic..

A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading.

This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic..

EPSS

Процентиль: 75%
0.00905
Низкий

8.6 High

CVSS3

Дефекты

CWE-787

Связанные уязвимости

CVSS3: 8.6
nvd
почти 2 года назад

A vulnerability in the IKEv1 fragmentation code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a heap underflow, resulting in an affected device reloading. This vulnerability exists because crafted, fragmented IKEv1 packets are not properly reassembled. An attacker could exploit this vulnerability by sending crafted UDP packets to an affected system. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Note: Only traffic that is directed to the affected system can be used to exploit this vulnerability. This vulnerability can be triggered by IPv4 and IPv6 traffic..

CVSS3: 8.6
fstec
почти 2 года назад

Уязвимость реализации протокола Internet Key Exchange (IKEv1) операционных систем Cisco IOS и IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

EPSS

Процентиль: 75%
0.00905
Низкий

8.6 High

CVSS3

Дефекты

CWE-787