First published: Fri Nov 13 2015(Updated: )
Cisco IOS 15.2(04)M6 and 15.4(03)S lets physical-interface ACLs supersede tunnel-interface ACLs, which allows remote attackers to bypass intended network-traffic restrictions in opportunistic circumstances by using a tunnel, aka Bug ID CSCur01042.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.2\(4\)m6 | |
Cisco IOS | =15.4\(3\)s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-6366 is considered to be high due to the potential for remote attackers to bypass network traffic restrictions.
To fix CVE-2015-6366, you should upgrade to a Cisco IOS version that is not affected, such as the latest recommended stable release.
CVE-2015-6366 affects Cisco IOS versions 15.2(04)M6 and 15.4(03)S.
The implications of CVE-2015-6366 include the possibility for attackers to exploit tunneling techniques to evade access control lists, leading to unauthorized access.
While upgrading is recommended, one potential workaround is to review and tighten existing ACL rules to mitigate the risk of exploitation.