First published: Wed Dec 21 2005(Updated: )
MD5 Neighbor Authentication in Extended Interior Gateway Routing Protocol (EIGRP) 1.2, as implemented in Cisco IOS 11.3 and later, does not include the Message Authentication Code (MAC) in the checksum, which allows remote attackers to sniff message hashes and (1) replay EIGRP HELLO messages or (2) cause a denial of service by sending a large number of spoofed EIGRP neighbor announcements, which results in an ARP storm on the local network.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Extended Interior Gateway Routing Protocol Extended Interior Gateway Routing Protocol | =1.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4437 is considered to have a medium severity level due to potential exposure to replay attacks.
To fix CVE-2005-4437, upgrade your Cisco IOS to a version that includes proper Message Authentication Code implementation.
CVE-2005-4437 affects Cisco IOS 11.3 and later versions running Extended Interior Gateway Routing Protocol version 1.2.
CVE-2005-4437 introduces vulnerabilities that allow remote attackers to sniff message hashes and replay EIGRP HELLO messages.
The exploitation of CVE-2005-4437 can be relatively straightforward for attackers who have the ability to monitor network traffic.