First published: Thu Feb 26 2009(Updated: )
Unspecified vulnerability in the SNMPv2c implementation in Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers before A2(1.3) and Cisco ACE 4710 Application Control Engine Appliance before A3(2.1) allows remote attackers to cause a denial of service (device reload) via a crafted SNMPv1 packet.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ACE 4710 Application Control Engine | =a1\(8.0\) | |
Cisco ACE 4710 Application Control Engine | <=a3\(2.0\) | |
Cisco ACE 4710 Application Control Engine | =a3\(1.0\) | |
Cisco ACE 4710 Application Control Engine | =a1\(2.0\) | |
Cisco ACE Module | <=1.2 | |
Cisco ACE Module | =1.0 | |
Cisco ACE Module | =1.1 | |
Cisco Catalyst 6500-E | ||
Cisco Catalyst 7600 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0624 has been rated as a high severity vulnerability due to its potential to cause a denial of service by remotely attacking the device.
To resolve CVE-2009-0624, update your Cisco ACE 4710 or ACE Module to the latest available software version that addresses this vulnerability.
CVE-2009-0624 affects Cisco ACE 4710 devices and the Cisco ACE Application Control Engine Module for Catalyst 6500 Switches and 7600 Routers.
Yes, CVE-2009-0624 can be exploited remotely, allowing attackers to potentially reload the affected devices.
Failure to address CVE-2009-0624 may lead to unexpected device reloading, resulting in a denial of service for users relying on those devices.