First published: Sun Oct 05 2014(Updated: )
Cisco IOS XR on ASR 9000 devices does not properly use compression for port-range and address-range encoding, which allows remote attackers to bypass intended Typhoon line-card ACL restrictions via transit traffic, aka Bug ID CSCup30133.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 | ||
Cisco ASR 9000v-v2 | ||
Cisco ASR 9001 | ||
Cisco ASR 9006 Router | ||
Cisco ASR 9010 Router | ||
Cisco ASR 9904 | ||
Cisco ASR 9912 | ||
Cisco ASR 9922 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3396 is considered a moderate severity vulnerability allowing bypass of ACL restrictions.
To mitigate CVE-2014-3396, apply the latest patches provided by Cisco for affected IOS XR versions.
CVE-2014-3396 affects various Cisco ASR 9000 series devices running affected versions of IOS XR.
Yes, CVE-2014-3396 can be exploited remotely via transit traffic by unauthorized attackers.
The potential impact of CVE-2014-3396 includes unauthorized access and manipulation of network traffic due to ACL bypass.