First published: Fri Nov 22 2013(Updated: )
Cisco IOS XE 3.8S(.2) and earlier does not properly use a DHCP pool during assignment of an IP address, which allows remote authenticated users to cause a denial of service (device reload) via an AAA packet that triggers an address requirement, aka Bug ID CSCuh04949.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | <=3.8s\(.2\) | |
Cisco IOS XE Web UI | =3.7.0s | |
Cisco IOS XE Web UI | =3.7.1s | |
Cisco IOS XE Web UI | =3.7.2s | |
Cisco IOS XE Web UI | =3.8.0s | |
Cisco IOS XE Web UI | =3.8s\(.0\) | |
Cisco IOS XE Web UI | =3.8s\(.1\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6692 is classified as a denial of service vulnerability affecting Cisco IOS XE.
To fix CVE-2013-6692, upgrade to Cisco IOS XE version 3.8S(3) or later.
The denial of service in CVE-2013-6692 occurs due to improper DHCP pool usage during IP address assignment.
CVE-2013-6692 affects remote authenticated users of Cisco IOS XE versions 3.8S(2) and earlier.
Yes, CVE-2013-6692 can be exploited by remote authenticated users with minimal effort to trigger a device reload.