Lucene search

K
ciscoCiscoCISCO-SA-20130327-SMARTINSTALL
HistoryMar 27, 2013 - 4:00 p.m.

Cisco IOS Software Smart Install Denial of Service Vulnerability

2013-03-2716:00:00
tools.cisco.com
27

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.013

Percentile

86.3%

The Smart Install client feature in Cisco IOS Software contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device.

Affected devices that are configured as Smart Install clients are vulnerable.

Cisco has released software updates that address this vulnerability. There are no workarounds for devices that have the Smart Install client feature enabled.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-smartinstall[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20130327-smartinstall”]

Note: The March 27, 2013, Cisco IOS Software Security Advisory bundled publication includes seven Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2013 bundled publication.

Individual publication links are in “Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication” at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html[“http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar13.html”]

Affected configurations

Vulners
Node
ciscoiosMatch12.2se
OR
ciscoiosMatch12.2ex
OR
ciscoiosMatch12.2ey
OR
ciscoiosMatch12.2ez
OR
ciscoiosMatch15.0ey
OR
ciscoiosMatch15.0se
OR
ciscoiosMatch15.2jaz
OR
ciscoiosMatch12.2\(55\)se
OR
ciscoiosMatch12.2\(55\)se3
OR
ciscoiosMatch12.2\(55\)se2
OR
ciscoiosMatch12.2\(58\)se
OR
ciscoiosMatch12.2\(55\)se1
OR
ciscoiosMatch12.2\(58\)se1
OR
ciscoiosMatch12.2\(55\)se4
OR
ciscoiosMatch12.2\(58\)se2
OR
ciscoiosMatch12.2\(55\)se5
OR
ciscoiosMatch12.2\(55\)se6
OR
ciscoiosMatch12.2\(55\)ex
OR
ciscoiosMatch12.2\(55\)ex1
OR
ciscoiosMatch12.2\(55\)ex2
OR
ciscoiosMatch12.2\(55\)ex3
OR
ciscoiosMatch12.2\(55\)ey
OR
ciscoiosMatch12.2\(55\)ez
OR
ciscoiosMatch15.0\(1\)ey
OR
ciscoiosMatch15.0\(1\)ey2
OR
ciscoiosMatch15.0\(1\)se
OR
ciscoiosMatch15.0\(2\)se
OR
ciscoiosMatch15.0\(1\)se1
OR
ciscoiosMatch15.0\(1\)se2
OR
ciscoiosMatch15.0\(1\)se3
OR
ciscoiosMatch15.2\(4\)jaz1
VendorProductVersionCPE
ciscoios12.2secpe:2.3:o:cisco:ios:12.2se:*:*:*:*:*:*:*
ciscoios12.2excpe:2.3:o:cisco:ios:12.2ex:*:*:*:*:*:*:*
ciscoios12.2eycpe:2.3:o:cisco:ios:12.2ey:*:*:*:*:*:*:*
ciscoios12.2ezcpe:2.3:o:cisco:ios:12.2ez:*:*:*:*:*:*:*
ciscoios15.0eycpe:2.3:o:cisco:ios:15.0ey:*:*:*:*:*:*:*
ciscoios15.0secpe:2.3:o:cisco:ios:15.0se:*:*:*:*:*:*:*
ciscoios15.2jazcpe:2.3:o:cisco:ios:15.2jaz:*:*:*:*:*:*:*
ciscoios12.2(55)secpe:2.3:o:cisco:ios:12.2\(55\)se:*:*:*:*:*:*:*
ciscoios12.2(55)se3cpe:2.3:o:cisco:ios:12.2\(55\)se3:*:*:*:*:*:*:*
ciscoios12.2(55)se2cpe:2.3:o:cisco:ios:12.2\(55\)se2:*:*:*:*:*:*:*
Rows per page:
1-10 of 311

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

EPSS

0.013

Percentile

86.3%

Related for CISCO-SA-20130327-SMARTINSTALL