Lucene search

K
ciscoCiscoCISCO-SA-20120926-DHCP
HistorySep 26, 2012 - 4:00 p.m.

Cisco IOS Software DHCP Denial of Service Vulnerability

2012-09-2616:00:00
tools.cisco.com
11

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

55.5%

Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. An attacker could exploit this vulnerability by sending a single DHCP packet to or through an affected device, causing the device to reload.

Cisco has released software updates that address this vulnerability. A workaround that mitigates this vulnerability is available. This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-dhcp[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20120926-dhcp”]

Note: The September 26, 2012, Cisco IOS Software Security Advisory bundled publication includes nine Cisco Security Advisories. Eight of the advisories address vulnerabilities in Cisco IOS Software, and one advisory addresses a vulnerability in Cisco Unified Communications Manager. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the September 2012 bundled publication.

Individual publication links are in “Cisco Event Response: Semi-Annual Cisco IOS Software Security Advisory Bundled Publication” at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_sep12.html”]

Affected configurations

Vulners
Node
ciscoiosMatch15.2s
OR
ciscoiosMatch15.0se
OR
ciscoiosMatch15.1sg
OR
ciscoiosMatch15.1svs
OR
ciscoiosMatch15.1svt
OR
ciscoiosMatch15.1svu
OR
ciscoiosMatch15.1svv
OR
ciscoiosMatch15.1svw
OR
ciscoiosMatch15.1svx
OR
ciscoiosMatch15.2\(2\)s
OR
ciscoiosMatch15.2\(2\)s0a
OR
ciscoiosMatch15.2\(2\)s0c
OR
ciscoiosMatch15.2\(2\)s0d
OR
ciscoiosMatch15.0\(1\)se
OR
ciscoiosMatch15.0\(1\)se1
OR
ciscoiosMatch15.0\(1\)se2
OR
ciscoiosMatch15.1\(1\)sg
OR
ciscoiosMatch15.1\(3\)svs
OR
ciscoiosMatch15.1\(3\)svt1
OR
ciscoiosMatch15.1\(3\)svt3
OR
ciscoiosMatch15.1\(3\)svt4
OR
ciscoiosMatch15.1\(3\)svu1
OR
ciscoiosMatch15.1\(3\)svu10
OR
ciscoiosMatch15.1\(3\)svu2
OR
ciscoiosMatch15.1\(3\)svu11
OR
ciscoiosMatch15.1\(3\)svu21
OR
ciscoiosMatch15.1\(3\)svv1
OR
ciscoiosMatch15.1\(3\)svv2
OR
ciscoiosMatch15.1\(3\)svv3
OR
ciscoiosMatch15.1\(3\)svv4
OR
ciscoiosMatch15.1\(3\)svw
OR
ciscoiosMatch15.1\(3\)svw1
OR
ciscoiosMatch15.1\(3\)svx
OR
ciscoiosMatch15.1\(3\)svx1

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

55.5%

Related for CISCO-SA-20120926-DHCP