First published: Sat Jun 14 2014(Updated: )
The HSRP implementation in Cisco NX-OS 6.2(2a) and earlier allows remote attackers to bypass authentication and cause a denial of service (group-member state modification and traffic blackholing) via malformed HSRP packets, aka Bug ID CSCup11309.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Nx-os | <=6.2\(2a\) | |
Cisco Nx-os | =4.1.\(2\) | |
Cisco Nx-os | =4.1.\(3\) | |
Cisco Nx-os | =4.1.\(4\) | |
Cisco Nx-os | =4.1.\(5\) | |
Cisco Nx-os | =4.2\(3\) | |
Cisco Nx-os | =4.2\(4\) | |
Cisco Nx-os | =4.2\(6\) | |
Cisco Nx-os | =4.2\(8\) | |
Cisco Nx-os | =4.2.\(2a\) | |
Cisco Nx-os | =5.0\(2a\) | |
Cisco Nx-os | =5.0\(3\) | |
Cisco Nx-os | =5.0\(5\) | |
Cisco Nx-os | =5.1\(1a\) | |
Cisco Nx-os | =5.1\(3\) | |
Cisco Nx-os | =5.1\(4\) | |
Cisco Nx-os | =5.1\(5\) | |
Cisco Nx-os | =5.1\(6\) | |
Cisco Nx-os | =5.2\(1\) | |
Cisco Nx-os | =5.2\(3a\) | |
Cisco Nx-os | =5.2\(4\) | |
Cisco Nx-os | =5.2\(5\) | |
Cisco Nx-os | =5.2\(7\) | |
Cisco Nx-os | =5.2\(9\) | |
Cisco Nx-os | =6.0\(1\) | |
Cisco Nx-os | =6.0\(2\) | |
Cisco Nx-os | =6.0\(3\) | |
Cisco Nx-os | =6.0\(4\) | |
Cisco Nx-os | =6.1\(1\) | |
Cisco Nx-os | =6.1\(2\) | |
Cisco Nx-os | =6.1\(3\) | |
Cisco Nx-os | =6.1\(4\) | |
Cisco Nx-os | =6.1\(4a\) | |
Cisco Nx-os | =6.2\(2\) |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.