First published: Thu Jan 23 2014(Updated: )
The OSPF implementation on Brocade routers does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Brocade ADX | ||
Brocade BigIron RX | ||
Brocade FastIron | ||
Brocade ICX | ||
Brocade MLX | ||
Brocade NetIron Cer | ||
Brocade NetIron CES 2024F-4X | ||
Brocade NetIron XMR 16000 | ||
Brocade TurboIron | ||
Brocade VDX | ||
Brocade Vyatta vRouter |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7306 has been classified as a high-severity vulnerability due to its potential to cause denial of service.
To mitigate CVE-2013-7306, update your Brocade router firmware to a version that addresses this vulnerability.
CVE-2013-7306 affects various Brocade devices, including the ADX, Bigiron RX, Fastiron, ICX, MLX, Netiron series, Turboiron, VDX, and Vyatta.
Attackers exploiting CVE-2013-7306 can cause a routing disruption or potentially access sensitive information from the affected router.
CVE-2013-7306 was disclosed in 2013, highlighting vulnerabilities in Brocade's OSPF implementation.