First published: Thu Feb 26 2009(Updated: )
Unspecified vulnerability in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SSH packet.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ACE 4710 Application Control Engine | <=a3\(2.0\) | |
Cisco ACE 4710 Application Control Engine | =a3\(1.0\) | |
Cisco ACE Module | <=a2\(1.2\) | |
Cisco ACE Module | =a2\(1.1\) | |
Cisco Catalyst | =6500 | |
Cisco Catalyst | =7600 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0623 is classified as a high severity vulnerability due to its potential for causing denial of service operations.
To address the vulnerability identified as CVE-2009-0623, upgrade the affected Cisco ACE Application Control Engine Module and Cisco ACE 4710 Appliance to the latest versions.
CVE-2009-0623 affects Cisco ACE 4710 appliances and Cisco ACE Application Control Engine modules running specific versions prior to the fixed releases.
CVE-2009-0623 allows remote attackers to execute a denial of service attack by sending specially crafted SSH packets.
There are no reported workarounds for CVE-2009-0623, and the recommended action is to upgrade to secure versions.