
25/9/2017

7/8/2024
CVE-2011-4667
First published: Mon Sep 25 2017(Updated: )
The encryption library in Cisco IOS Software 15.2(1)T, 15.2(1)T1, and 15.2(2)T, Cisco NX-OS in Cisco MDS 9222i Multiservice Modular Switch, Cisco MDS 9000 18/4-Port Multiservice Module, and Cisco MDS 9000 Storage Services Node module before 5.2(6), and Cisco IOS in Cisco VPN Services Port Adaptor for Catalyst 6500 12.2(33)SXI, and 12.2(33)SXJ when IP Security (aka IPSec) is used, allows remote attackers to obtain unencrypted packets from encrypted sessions.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|
Cisco IOS | =15.2\(1\)t | |
Cisco IOS | =12.2\(33\)sxj | |
Cisco IOS | =12.2\(33\)sxi | |
Cisco NX-OS | =5.0\(5\) | |
Cisco IOS | =15.2\(2\)t | |
Cisco IOS | =15.2\(1\)t1 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2011-4667?
CVE-2011-4667 has a high severity rating due to its impact on encryption functionality.
How do I fix CVE-2011-4667?
To fix CVE-2011-4667, you should upgrade to the latest recommended version of Cisco IOS or NX-OS that addresses this vulnerability.
Which Cisco products are affected by CVE-2011-4667?
CVE-2011-4667 affects specific versions of Cisco IOS Software and Cisco NX-OS used on certain Cisco switches and modules.
What could happen if I do not address CVE-2011-4667?
If CVE-2011-4667 is not addressed, it could lead to potential data breaches due to compromised encryption.
How can I determine if my Cisco device is affected by CVE-2011-4667?
You can determine if your Cisco device is affected by CVE-2011-4667 by checking the specific software version it is running against the known vulnerable versions.
- agent/references
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/severity
- agent/weakness
- agent/author
- agent/last-modified-date
- agent/description
- agent/first-publish-date
- agent/event
- agent/source
- agent/tags
- collector/nvd-historical
- agent/software-canonical-lookup-request
- collector/nvd-index
- vendor/cisco
- canonical/cisco ios
- version/cisco ios/15.2\(1\)t
- version/cisco ios/12.2\(33\)sxj
- version/cisco ios/12.2\(33\)sxi
- canonical/cisco nx-os
- version/cisco nx-os/5.0\(5\)
- version/cisco ios/15.2\(2\)t
- version/cisco ios/15.2\(1\)t1
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203