Логотип exploitDog
bind:CVE-2019-12663
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2019-12663

Количество 3

Количество 3

nvd логотип

CVE-2019-12663

больше 6 лет назад

A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.

CVSS3: 8.6
EPSS: Низкий
github логотип

GHSA-6jpf-pwf8-qj8x

больше 3 лет назад

A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.

CVSS3: 8.6
EPSS: Низкий
fstec логотип

BDU:2019-03450

больше 6 лет назад

Уязвимость системы управления безопасностью сети Cisco TrustSec (CTS) операционной системы Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2019-12663

A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.

CVSS3: 8.6
0%
Низкий
больше 6 лет назад
github логотип
GHSA-6jpf-pwf8-qj8x

A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.

CVSS3: 8.6
0%
Низкий
больше 3 лет назад
fstec логотип
BDU:2019-03450

Уязвимость системы управления безопасностью сети Cisco TrustSec (CTS) операционной системы Cisco IOS XE, позволяющая нарушителю вызвать отказ в обслуживании

CVSS3: 6.8
0%
Низкий
больше 6 лет назад

Уязвимостей на страницу