First published: Fri Aug 13 2010(Updated: )
Unspecified vulnerability in the RTSP inspection feature on the Cisco Application Control Engine (ACE) Module with software before A2(3.2) for Catalyst 6500 series switches and 7600 series routers, and the Cisco Application Control Engine (ACE) 4710 appliance with software before A3(2.6), allows remote attackers to cause a denial of service (device reload) via crafted RTSP packets over TCP, aka Bug IDs CSCta85227 and CSCtg14858.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ACE 4710 Application Control Engine | =a3\(2.0\) | |
Cisco ACE 4710 Application Control Engine | =a1\(8.0\) | |
Cisco ACE 4710 Application Control Engine | =a3\(2.5\) | |
Cisco ACE 4710 Application Control Engine | =a3\(1.0\) | |
Cisco ACE 4710 Application Control Engine | ||
Cisco ACE 4710 Application Control Engine | =a1\(2.0\) | |
Cisco ACE 4710 Application Control Engine | =a3\(1.0\) | |
Cisco Application Control Engine (ACE) 10 | <=a2\(3.1.0\) | |
Cisco Catalyst 6500-E | ||
Cisco Catalyst 7600 Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-2822 has a moderate severity rating due to its potential impact on the RTSP inspection feature.
To fix CVE-2010-2822, you should upgrade the affected Cisco ACE software to a version that is not vulnerable, specifically A2(3.2) or later for the ACE Module.
CVE-2010-2822 affects Cisco Application Control Engine (ACE) modules and appliances running specific versions prior to the fixed versions.
There are no known workarounds for CVE-2010-2822; updating to a secure version is the recommended action.
CVE-2010-2822 is associated with unspecified vulnerabilities that could allow unauthorized access through the RTSP inspection feature.