First published: Wed May 02 2012(Updated: )
Cisco IOS 12.4 and 15.0 through 15.2 allows physically proximate attackers to bypass the No Service Password-Recovery feature and read the start-up configuration via unspecified vectors, aka Bug ID CSCtr97640.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.1 | |
Cisco IOS | =15.0 | |
Cisco IOS | =12.4 | |
Cisco IOS | =15.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3289 has a High severity rating due to the ability of physically proximate attackers to bypass security features.
To fix CVE-2011-3289, it's recommended to upgrade to a version of Cisco IOS that does not contain this vulnerability.
CVE-2011-3289 affects Cisco IOS versions 12.4, 15.0, 15.1, and 15.2.
By exploiting CVE-2011-3289, attackers can bypass the No Service Password-Recovery feature and access the start-up configuration.
Yes, physical access to the device is required to exploit CVE-2011-3289.