First published: Mon Sep 28 2009(Updated: )
The Object Groups for Access Control Lists (ACLs) feature in Cisco IOS 12.2XNB, 12.2XNC, 12.2XND, 12.4MD, 12.4T, 12.4XZ, and 12.4YA allows remote attackers to bypass intended access restrictions via crafted requests, aka Bug IDs CSCsx07114, CSCsu70214, CSCsw47076, CSCsv48603, CSCsy54122, and CSCsu50252.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2xnd | |
Cisco IOS | =12.4t | |
Cisco IOS | =12.4ya | |
Cisco IOS | =12.4xz | |
Cisco IOS | =12.2xnb | |
Cisco IOS | =12.4md | |
Cisco IOS | =12.2xnc |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-2862 is classified as a high severity vulnerability.
To mitigate CVE-2009-2862, upgrade your Cisco IOS software to a fixed version as per Cisco's security advisory.
CVE-2009-2862 affects multiple Cisco IOS versions including 12.2XNB, 12.2XNC, 12.2XND, 12.4MD, 12.4T, 12.4XZ, and 12.4YA.
Yes, CVE-2009-2862 can be exploited remotely by attackers due to the bypass of intended access restrictions.
CVE-2009-2862 is categorized as an access control vulnerability within Cisco IOS.