First published: Fri Sep 26 2008(Updated: )
A "logic error" in Cisco IOS 12.0 through 12.4, when a Multiprotocol Label Switching (MPLS) VPN with extended communities is configured, sometimes causes a corrupted route target (RT) to be used, which allows remote attackers to read traffic from other VPNs in opportunistic circumstances.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.0sz | |
Cisco IOS | =12.0s | |
Cisco IOS | =12.0sx |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3803 has a moderate severity rating due to its potential to allow unauthorized access to VPN traffic.
To mitigate CVE-2008-3803, users should upgrade their Cisco IOS software to a version that does not have this vulnerability.
CVE-2008-3803 affects Cisco IOS versions 12.0 through 12.4, specifically 12.0s, 12.0sx, and 12.0sz.
CVE-2008-3803 permits remote attackers to read traffic from other VPNs, resulting in unauthorized data exposure.
While CVE-2008-3803 specifically targets older Cisco IOS versions, organizations using those versions should prioritize upgrading to protect against potential exploits.