First published: Fri Oct 13 2000(Updated: )
Cisco Gigabit Switch Routers (GSR) with Fast Ethernet / Gigabit Ethernet cards, from IOS versions 11.2(15)GS1A up to 11.2(19)GS0.2 and some versions of 12.0, do not properly handle line card failures, which allows remote attackers to bypass ACLs or force the interface to stop forwarding packets.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.0\(5\) | |
Cisco IOS | =12.0\(6\) | |
Cisco IOS | =11.3\(1\) | |
Cisco IOS | =12.0\(2\) | |
Cisco IOS | =12.0\(1\) | |
Cisco IOS | =12.0\(3\) | |
Cisco IOS | =12.0\(7\)t | |
Cisco IOS | =11.3 | |
Cisco IOS | =11.2p | |
Cisco IOS | =12.1 | |
Cisco IOS | =11.2 | |
Cisco IOS | =12.0\(4\) | |
Cisco IOS | =11.2\(8\) | |
Cisco IOS | =12.0 | |
Cisco IOS | =11.2\(10\) | |
Cisco Gigabit Switch Router 12012 | ||
Cisco Gigabit Switch Router 12016 | ||
Cisco Gigabit Switch Router 12008 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2000-0700 has been classified with a moderate severity rating due to the potential for unauthorized access and service disruption.
To mitigate CVE-2000-0700, update Cisco IOS to a version that addresses this vulnerability, such as versions beyond 12.0(7)t.
CVE-2000-0700 affects Cisco Gigabit Switch Routers with specific IOS versions including 11.2 and multiple versions in the 12.0 line.
Exploitation of CVE-2000-0700 may allow an attacker to bypass Access Control Lists (ACLs) or disrupt the normal packet forwarding functionality.
Network monitoring for unusual traffic patterns and access attempts can help detect potential exploitation of CVE-2000-0700.