First published: Fri Oct 16 2015(Updated: )
Cisco ASR 5000 and 5500 devices with software 18.0.0.57828 and 19.0.M0.61045 allow remote attackers to cause a denial of service (vpnmgr process restart) via a crafted header in a TACACS packet, aka Bug ID CSCuw01984.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASR 5000 Software | =18.0.0.57828 | |
Cisco ASR 5000 Software | =19.0.m0.61045 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-6334 has been classified with a severity rating that indicates it can lead to a denial of service attack on affected Cisco ASR 5000 and 5500 devices.
To mitigate CVE-2015-6334, it is recommended to upgrade your Cisco ASR 5000 and 5500 devices to the latest software versions that are not vulnerable.
CVE-2015-6334 is caused by a vulnerability that allows remote attackers to trigger a restart of the vpnmgr process through a crafted TACACS header.
CVE-2015-6334 affects Cisco ASR 5000 and 5500 devices running software versions 18.0.0.57828 and 19.0.M0.61045.
Yes, CVE-2015-6334 can be exploited remotely by attackers sending specially crafted TACACS packets.