First published: Fri Sep 26 2008(Updated: )
Cisco IOS 12.4, when IOS firewall Application Inspection Control (AIC) with HTTP Deep Packet Inspection is enabled, allows remote attackers to cause a denial of service (device reload) via a malformed HTTP transit packet.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.4t | |
Cisco IOS | =12.4xj | |
Cisco IOS | =12.4xv | |
Cisco IOS | =12.4xw | |
Cisco IOS | =12.4xk | |
Cisco IOS | =12.4xe |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-3812 is considered to have a high severity due to its potential to cause denial of service through device reload.
To mitigate CVE-2008-3812, it is recommended to disable HTTP Deep Packet Inspection in the Cisco IOS firewall settings.
CVE-2008-3812 affects Cisco IOS versions 12.4t, 12.4xj, 12.4xv, 12.4xw, 12.4xk, and 12.4xe.
Network administrators using the specified versions of Cisco IOS with HTTP Deep Packet Inspection enabled are impacted by CVE-2008-3812.
As of the last reports, CVE-2008-3812 was known to be a vulnerability that could be exploited remotely, presenting a security risk that should be addressed.