![]() |
Inicial ▼ Bookkeeping
Online ▼ Auditorias ▼
DNS
Administrado ▼
Acerca de DNS
Ordenar/Renovar
Preguntas Frecuentes
AUP
Dynamic DNS Clients
Configurar Dominios Dynamic DNS Update Password Monitoreo
de Redes ▼
Enterprise
Avanzado
Estándarr
Prueba
Preguntas Frecuentes
Resumen de Precio/Funciones
Ordenar
Muestras
Configure/Status Alert Profiles | ||
ID de Prueba: | 1.3.6.1.4.1.25623.1.0.106674 |
Categoría: | CISCO |
Título: | Cisco IOS XE Software IPv6 Denial of Service Vulnerability |
Resumen: | A vulnerability in the Autonomic Networking Infrastructure (ANI) feature of;Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS);condition. |
Descripción: | Summary: A vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. Vulnerability Insight: The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to a device that is running a Cisco IOS XE Software release that supports the ANI feature. A device must meet two conditions to be affected by this vulnerability: - The device must be running a version of Cisco IOS XE Software that supports ANI (regardless of whether ANI is configured) - The device must have a reachable IPv6 interface. Vulnerability Impact: An exploit could allow the attacker to cause the affected device to reload. Solution: See the referenced vendor advisory for a solution. CVSS Score: 7.1 CVSS Vector: AV:N/AC:M/Au:N/C:N/I:N/A:C |
Referencia Cruzada: |
Common Vulnerability Exposure (CVE) ID: CVE-2017-3850 BugTraq ID: 96971 http://www.securityfocus.com/bid/96971 http://www.securitytracker.com/id/1038065 |
Copyright | Copyright (C) 2017 Greenbone AG |
Esta es sólo una de 146377 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa. Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora. |