Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-9mj8-267m-m844

Опубликовано: 01 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Cisco IOS 12.2T, 12.3 and 12.3T, when processing an ISAKMP profile that specifies XAUTH authentication after Phase 1 negotiation, may not process certain attributes in the ISAKMP profile that specifies XAUTH, which allows remote attackers to bypass XAUTH and move to Phase 2 negotiations.

Cisco IOS 12.2T, 12.3 and 12.3T, when processing an ISAKMP profile that specifies XAUTH authentication after Phase 1 negotiation, may not process certain attributes in the ISAKMP profile that specifies XAUTH, which allows remote attackers to bypass XAUTH and move to Phase 2 negotiations.

EPSS

Процентиль: 68%
0.00572
Низкий

Связанные уязвимости

nvd
почти 21 год назад

Cisco IOS 12.2T, 12.3 and 12.3T, when processing an ISAKMP profile that specifies XAUTH authentication after Phase 1 negotiation, may not process certain attributes in the ISAKMP profile that specifies XAUTH, which allows remote attackers to bypass XAUTH and move to Phase 2 negotiations.

EPSS

Процентиль: 68%
0.00572
Низкий