First published: Fri Jun 12 2015(Updated: )
The IKE implementation in the WS-IPSEC-3 service module in Cisco IOS 12.2 on Catalyst 6500 devices allows remote authenticated users to cause a denial of service (device reload) by sending a crafted message during IPsec tunnel setup, aka Bug ID CSCur70505.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2\(33\)sxj8 | |
Cisco IOS | =12.2sxj | |
cisco catalyst 6503-e firmware | ||
Cisco Catalyst 6504-E Firmware | ||
Cisco Catalyst 6506-E Firmware | ||
Cisco Catalyst 6509-E Firmware | ||
Cisco Catalyst 6509-NEB-A Firmware | ||
Cisco Catalyst 6509-V-E | ||
Cisco Catalyst 6513 | ||
Cisco Catalyst 6513 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-0771 has a severity rating that indicates it can lead to a denial of service condition.
To fix CVE-2015-0771, it is recommended to apply the latest patches or updates provided by Cisco for affected IOS versions.
CVE-2015-0771 affects devices running Cisco IOS 12.2, specifically the Catalyst 6500 series.
Yes, CVE-2015-0771 can be exploited remotely by authenticated users during the IPsec tunnel setup.
CVE-2015-0771 is classified as a denial of service vulnerability affecting the IKE implementation of Cisco IOS.