First published: Tue Oct 23 2007(Updated: )
Unspecified vulnerability in the Extensible Authentication Protocol (EAP) implementation in Cisco IOS 12.3 and 12.4 on Cisco Access Points and 1310 Wireless Bridges (Wireless EAP devices), IOS 12.1 and 12.2 on Cisco switches (Wired EAP devices), and CatOS 6.x through 8.x on Cisco switches allows remote attackers to cause a denial of service (device reload) via a crafted EAP Response Identity packet.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco CatOS | =6.2 | |
Cisco CatOS | =7.4 | |
Puppet Cisco IOS | =12.3jec | |
Cisco CatOS | =6.3 | |
Cisco CatOS | =7.6 | |
Cisco CatOS | =6.4 | |
Cisco CatOS | =7.3 | |
Cisco CatOS | =8.1 | |
Cisco CatOS | =7.1 | |
Cisco CatOS | =7.5 | |
Cisco CatOS | =8.2 | |
Puppet Cisco IOS | =12.1 | |
Cisco CatOS | =6.1 | |
Puppet Cisco IOS | =12.3jea | |
Puppet Cisco IOS | =12.3ja | |
Cisco CatOS | =7.2 | |
Cisco CatOS | =8.5 | |
Puppet Cisco IOS | =12.3jeb | |
Puppet Cisco IOS | =12.4ja | |
Puppet Cisco IOS | =12.2 | |
Cisco CatOS | =8.4 | |
Cisco CatOS | =8.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5651 is rated as high severity due to its potential to allow unauthorized access to network devices.
To fix CVE-2007-5651, upgrade affected Cisco IOS and CatOS versions to the latest patches or recommended versions provided by Cisco.
CVE-2007-5651 affects various Cisco IOS versions including 12.1, 12.2, 12.3, and 12.4, as well as multiple versions of CatOS.
CVE-2007-5651 impacts Cisco Access Points, Wireless Bridges, and Cisco switches utilizing EAP.
Yes, CVE-2007-5651 is remotely exploitable, which increases the risk for organizations running affected devices.