First published: Sat Oct 22 2011(Updated: )
The cat6000-dot1x component in Cisco IOS 12.2 before 12.2(33)SXI7 does not properly handle an external loop between a pair of dot1x enabled ports, which allows remote attackers to cause a denial of service (traffic storm) via unspecified vectors that trigger many unicast EAPoL Protocol Data Units (PDUs), aka Bug ID CSCtq36336.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | >=12.2<12.2\(33\)sxi7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2058 has a severity rating that indicates a significant risk of denial of service due to traffic storms caused by improper handling of external loops.
To mitigate CVE-2011-2058, upgrade your Cisco IOS to version 12.2(33)SXI7 or later.
CVE-2011-2058 affects devices running Cisco IOS versions prior to 12.2(33)SXI7 that utilize the cat6000-dot1x component.
The main impact of CVE-2011-2058 is that it can cause a denial of service by creating a traffic storm due to excessive unicast EAPoL Protocol Data Units.
Yes, CVE-2011-2058 can be exploited remotely by attackers leveraging the vulnerability to induce a denial of service.