First published: Wed Sep 01 1999(Updated: )
Cisco Catalyst 2900 Virtual LAN (VLAN) switches allow remote attackers to inject 802.1q frames into another VLAN by forging the VLAN identifier in the trunking tag.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =11.2\(8\)sa5 | |
Cisco Catalyst 2900 VLAN |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-1129 is considered a high severity vulnerability due to the potential for VLAN hopping and unauthorized access to different network segments.
To fix CVE-1999-1129, ensure that proper VLAN configurations are in place and disable trunking on ports where it is not required.
CVE-1999-1129 affects Cisco Catalyst 2900 VLAN switches and specific versions of Cisco IOS.
The potential impacts of CVE-1999-1129 include unauthorized access, data interception, and compromised network integrity.
A potential workaround for CVE-1999-1129 includes implementing port security features and monitoring VLAN configurations to prevent unauthorized frame injection.