Lucene search

K
ciscoCiscoCISCO-SA-20100922-SSLVPN
HistorySep 22, 2010 - 4:00 p.m.

Cisco IOS SSL VPN Vulnerability

2010-09-2216:00:00
tools.cisco.com
31

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

49.5%

Cisco IOS® Software contains a vulnerability when the Cisco IOS SSL VPN
feature is configured with an HTTP redirect. Exploitation could allow a remote,
unauthenticated user to cause a memory leak on the affected devices, that could
result in a memory exhaustion condition that may cause device reloads, the
inability to service new TCP connections, and other denial of service (DoS)
conditions.

Cisco has released software updates that address this vulnerability. There is a workaround to mitigate this vulnerability.

This advisory is posted at
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20100922-sslvpn[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20100922-sslvpn”].

Note: The September 22, 2010, Cisco IOS Software Security Advisory bundled
publication includes six Cisco Security Advisories. Five of the advisories
address vulnerabilities in Cisco IOS Software, and one advisory addresses
vulnerabilities in Cisco Unified Communications Manager. Each advisory lists
the releases that correct the vulnerability or vulnerabilities detailed in the
advisory. The table at the following URL lists releases that correct all Cisco
IOS Software vulnerabilities that have been published on September 22, 2010, or
earlier:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20100922-bundle[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20100922-bundle”]

Individual publication links are in “Cisco Event Response:
Semiannual Cisco IOS Software Security Advisory Bundled Publication” at the
following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep10.html”]

Affected configurations

Vulners
Node
ciscoiosMatch12.4t
OR
ciscoiosMatch15.0m
OR
ciscoiosMatch15.1t
OR
ciscoiosMatch15.1xb
OR
ciscoiosMatch12.4\(24\)t3
OR
ciscoiosMatch12.4\(15\)t13
OR
ciscoiosMatch12.4\(24\)t2
OR
ciscoiosMatch12.4\(22\)t5
OR
ciscoiosMatch12.4\(22\)t4
OR
ciscoiosMatch12.4\(20\)t5
OR
ciscoiosMatch12.4\(20\)t5a
OR
ciscoiosMatch15.0\(1\)m1
OR
ciscoiosMatch15.0\(1\)m2
OR
ciscoiosMatch15.0\(1\)m
OR
ciscoiosMatch15.1\(1\)t
OR
ciscoiosMatch15.1\(1\)xb
OR
ciscoiosMatch15.1\(1\)xb1

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

AI Score

6.6

Confidence

High

EPSS

0.001

Percentile

49.5%

Related for CISCO-SA-20100922-SSLVPN