Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p9jh-j6cv-6pph

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to spoof Autonomic Networking Registration Authority (ANRA) responses, and consequently bypass intended device and node access restrictions or cause a denial of service (disrupted domain access), via crafted AN messages, aka Bug ID CSCup62191.

The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to spoof Autonomic Networking Registration Authority (ANRA) responses, and consequently bypass intended device and node access restrictions or cause a denial of service (disrupted domain access), via crafted AN messages, aka Bug ID CSCup62191.

EPSS

Процентиль: 33%
0.00134
Низкий

Дефекты

CWE-20

Связанные уязвимости

nvd
почти 11 лет назад

The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to spoof Autonomic Networking Registration Authority (ANRA) responses, and consequently bypass intended device and node access restrictions or cause a denial of service (disrupted domain access), via crafted AN messages, aka Bug ID CSCup62191.

fstec
почти 11 лет назад

Уязвимость операционной системы Cisco IOS, позволяющая удаленному злоумышленнику обойти правила разграничения доступа или вызвать отказ в обслуживании

EPSS

Процентиль: 33%
0.00134
Низкий

Дефекты

CWE-20