Lucene search

K
ciscoCiscoCISCO-SA-20140326-RSP72010GE
HistoryMar 26, 2014 - 4:00 p.m.

Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks Denial of Service Vulnerability

2014-03-2616:00:00
tools.cisco.com
20

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.2%

A vulnerability in the Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks models RSP720-3C-10GE and RSP720-3CXL-10GE could allow an unauthenticated, remote attacker to cause the route processor to reboot or stop forwarding traffic. The vulnerability is due to an issue in the Kailash field-programmable gate array (FPGA) versions prior to 2.6.

Cisco has released software updates that address this vulnerability. Workarounds that mitigate this vulnerability are not available.

This advisory is available at the following link:

https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-RSP72010GE[โ€œhttps://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20140326-RSP72010GEโ€]

Note: The March 26, 2014, Cisco IOS Software Security Advisory bundled publication includes six Cisco Security Advisories. All advisories address vulnerabilities in Cisco IOS Software. Each Cisco IOS Software Security Advisory lists the Cisco IOS Software releases that correct the vulnerability or vulnerabilities detailed in the advisory as well as the Cisco IOS Software releases that correct all Cisco IOS Software vulnerabilities in the March 2014 bundled publication.

Individual publication links are in Cisco Event Response: Semiannual Cisco IOS Software Security Advisory Bundled Publication at the following link:

http://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.html[โ€œhttp://www.cisco.com/web/about/security/intelligence/Cisco_ERP_mar14.htmlโ€]

Affected configurations

Vulners
Node
ciscoiosMatch12.2zi
OR
ciscoiosMatch12.2src
OR
ciscoiosMatch12.2srd
OR
ciscoiosMatch12.2sre
OR
ciscoiosMatch15.0s
OR
ciscoiosMatch15.2s
OR
ciscoiosMatch12.2zz
OR
ciscoiosMatch15.1s
OR
ciscoiosMatch15.3s
OR
ciscoiosMatch15.2sc
OR
ciscoiosMatch15.1svs
OR
ciscoiosMatch15.1svt
OR
ciscoiosMatch15.1svu
OR
ciscoiosMatch15.1svv
OR
ciscoiosMatch15.1svw
OR
ciscoiosMatch15.1svx
OR
ciscoiosMatch12.2\(33\)zi
OR
ciscoiosMatch12.2\(33\)src2
OR
ciscoiosMatch12.2\(33\)src
OR
ciscoiosMatch12.2\(33\)src3
OR
ciscoiosMatch12.2\(33\)src5
OR
ciscoiosMatch12.2\(33\)src6
OR
ciscoiosMatch12.2\(33\)src4
OR
ciscoiosMatch12.2\(33\)src1
OR
ciscoiosMatch12.2\(33\)srd7
OR
ciscoiosMatch12.2\(33\)srd6
OR
ciscoiosMatch12.2\(33\)srd4a
OR
ciscoiosMatch12.2\(33\)srd2a
OR
ciscoiosMatch12.2\(33\)srd4
OR
ciscoiosMatch12.2\(33\)srd5
OR
ciscoiosMatch12.2\(33\)srd3
OR
ciscoiosMatch12.2\(33\)srd2
OR
ciscoiosMatch12.2\(33\)srd1
OR
ciscoiosMatch12.2\(33\)srd
OR
ciscoiosMatch12.2\(33\)srd8
OR
ciscoiosMatch12.2\(33\)sre1
OR
ciscoiosMatch12.2\(33\)sre2
OR
ciscoiosMatch12.2\(33\)sre3
OR
ciscoiosMatch12.2\(33\)sre4
OR
ciscoiosMatch12.2\(33\)sre
OR
ciscoiosMatch12.2\(33\)sre0a
OR
ciscoiosMatch12.2\(33\)sre5
OR
ciscoiosMatch12.2\(33\)sre6
OR
ciscoiosMatch12.2\(33\)sre8
OR
ciscoiosMatch12.2\(33\)sre7
OR
ciscoiosMatch12.2\(33\)sre9
OR
ciscoiosMatch12.2\(33\)sre7a
OR
ciscoiosMatch12.2\(33\)sre9a
OR
ciscoiosMatch15.0\(1\)s2
OR
ciscoiosMatch15.0\(1\)s1
OR
ciscoiosMatch15.0\(1\)s
OR
ciscoiosMatch15.0\(1\)s3a
OR
ciscoiosMatch15.0\(1\)s4
OR
ciscoiosMatch15.0\(1\)s5
OR
ciscoiosMatch15.0\(1\)s4a
OR
ciscoiosMatch15.0\(1\)s6
OR
ciscoiosMatch15.2\(1\)s
OR
ciscoiosMatch15.2\(2\)s
OR
ciscoiosMatch15.2\(1\)s1
OR
ciscoiosMatch15.2\(4\)s
OR
ciscoiosMatch15.2\(1\)s2
OR
ciscoiosMatch15.2\(2\)s1
OR
ciscoiosMatch15.2\(2\)s2
OR
ciscoiosMatch15.2\(4\)s1
OR
ciscoiosMatch15.2\(4\)s4
OR
ciscoiosMatch15.2\(4\)s2
OR
ciscoiosMatch15.2\(4\)s3a
OR
ciscoiosMatch15.2\(4\)s4a
OR
ciscoiosMatch12.2\(33\)zz
OR
ciscoiosMatch15.1\(2\)s
OR
ciscoiosMatch15.1\(1\)s
OR
ciscoiosMatch15.1\(1\)s1
OR
ciscoiosMatch15.1\(3\)s
OR
ciscoiosMatch15.1\(1\)s2
OR
ciscoiosMatch15.1\(2\)s1
OR
ciscoiosMatch15.1\(2\)s2
OR
ciscoiosMatch15.1\(3\)s1
OR
ciscoiosMatch15.1\(3\)s0a
OR
ciscoiosMatch15.1\(3\)s2
OR
ciscoiosMatch15.1\(3\)s4
OR
ciscoiosMatch15.1\(3\)s3
OR
ciscoiosMatch15.1\(3\)s5
OR
ciscoiosMatch15.1\(3\)s6
OR
ciscoiosMatch15.3\(1\)s
OR
ciscoiosMatch15.3\(2\)s
OR
ciscoiosMatch15.3\(3\)s
OR
ciscoiosMatch15.3\(1\)s2
OR
ciscoiosMatch15.3\(1\)s1
OR
ciscoiosMatch15.3\(2\)s2
OR
ciscoiosMatch15.3\(2\)s1
OR
ciscoiosMatch15.3\(3\)s1
OR
ciscoiosMatch15.2\(2\)sc3
OR
ciscoiosMatch15.1\(3\)svs
OR
ciscoiosMatch15.1\(3\)svt1
OR
ciscoiosMatch15.1\(3\)svt3
OR
ciscoiosMatch15.1\(3\)svt4
OR
ciscoiosMatch15.1\(3\)svu1
OR
ciscoiosMatch15.1\(3\)svu10
OR
ciscoiosMatch15.1\(3\)svu2
OR
ciscoiosMatch15.1\(3\)svu11
OR
ciscoiosMatch15.1\(3\)svu21
OR
ciscoiosMatch15.1\(3\)svv1
OR
ciscoiosMatch15.1\(3\)svv2
OR
ciscoiosMatch15.1\(3\)svv3
OR
ciscoiosMatch15.1\(3\)svv4
OR
ciscoiosMatch15.1\(3\)svw
OR
ciscoiosMatch15.1\(3\)svw1
OR
ciscoiosMatch15.1\(3\)svx
OR
ciscoiosMatch15.1\(3\)svx1
VendorProductVersionCPE
ciscoios12.2zicpe:2.3:o:cisco:ios:12.2zi:*:*:*:*:*:*:*
ciscoios12.2srccpe:2.3:o:cisco:ios:12.2src:*:*:*:*:*:*:*
ciscoios12.2srdcpe:2.3:o:cisco:ios:12.2srd:*:*:*:*:*:*:*
ciscoios12.2srecpe:2.3:o:cisco:ios:12.2sre:*:*:*:*:*:*:*
ciscoios15.0scpe:2.3:o:cisco:ios:15.0s:*:*:*:*:*:*:*
ciscoios15.2scpe:2.3:o:cisco:ios:15.2s:*:*:*:*:*:*:*
ciscoios12.2zzcpe:2.3:o:cisco:ios:12.2zz:*:*:*:*:*:*:*
ciscoios15.1scpe:2.3:o:cisco:ios:15.1s:*:*:*:*:*:*:*
ciscoios15.3scpe:2.3:o:cisco:ios:15.3s:*:*:*:*:*:*:*
ciscoios15.2sccpe:2.3:o:cisco:ios:15.2sc:*:*:*:*:*:*:*
Rows per page:
1-10 of 1091

CVSS2

7.1

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:N/I:N/A:C

EPSS

0.002

Percentile

56.2%

Related for CISCO-SA-20140326-RSP72010GE