First published: Thu Mar 28 2013(Updated: )
The Smart Install client functionality in Cisco IOS 12.2 and 15.0 through 15.3 on Catalyst switches allows remote attackers to cause a denial of service (device reload) via crafted image list parameters in Smart Install packets, aka Bug ID CSCub55790.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2 | |
Cisco IOS | =15.0 | |
Cisco IOS | =15.0\(1\)se | |
Cisco IOS | =15.1 | |
Cisco IOS | =15.2 | |
Cisco IOS | =15.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1146 has a severity rating of high due to its potential to cause a denial of service by device reload.
To fix CVE-2013-1146, update your Cisco IOS to a version that is not affected by this vulnerability.
CVE-2013-1146 affects Cisco IOS versions 12.2 and 15.0 through 15.3 on Catalyst switches.
CVE-2013-1146 involves a remote denial of service attack through crafted image list parameters in Smart Install packets.
Yes, disabling the Smart Install service can act as a temporary workaround for CVE-2013-1146.