First published: Sat Oct 22 2011(Updated: )
The cat6000-dot1x component in Cisco IOS 12.2 before 12.2(33)SXI7 does not properly handle (1) a loop between a dot1x enabled port and an open-authentication dot1x enabled port and (2) a loop between a dot1x enabled port and a non-dot1x port, which allows remote attackers to cause a denial of service (traffic storm) via unspecified vectors that trigger many Spanning Tree Protocol (STP) Bridge Protocol Data Unit (BPDU) frames, aka Bug ID CSCtq36327.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | >=12.2<12.2\(33\)sxi7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2057 is classified as a high severity vulnerability due to its potential to cause a denial of service.
To fix CVE-2011-2057, upgrade to Cisco IOS version 12.2(33)SXI7 or later.
CVE-2011-2057 can be exploited through the establishment of loops between dot1x enabled ports and open-authentication or non-dot1x ports.
CVE-2011-2057 affects Cisco IOS versions prior to 12.2(33)SXI7 on systems utilizing the cat6000-dot1x component.
Yes, CVE-2011-2057 can be exploited remotely by attackers creating specific network loops.