First published: Thu Mar 28 2019(Updated: )
A vulnerability in access control list (ACL) functionality of the Gigabit Ethernet Management interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to reach the configured IP addresses on the Gigabit Ethernet Management interface. The vulnerability is due to a logic error that was introduced in the Cisco IOS XE Software 16.1.1 Release, which prevents the ACL from working when applied against the management interface. An attacker could exploit this issue by attempting to access the device via the management interface.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =3.2.0ja | |
Cisco IOS XE | =16.2.1 | |
Cisco IOS XE | =16.2.2 | |
Cisco IOS XE | =16.3.1 | |
Cisco IOS XE | =16.3.1a | |
Cisco IOS XE | =16.3.2 | |
Cisco IOS XE | =16.3.3 | |
Cisco IOS XE | =16.3.4 | |
Cisco IOS XE | =16.3.5 | |
Cisco IOS XE | =16.3.5b | |
Cisco IOS XE | =16.3.6 | |
Cisco IOS XE | =16.3.7 | |
Cisco IOS XE | =16.4.1 | |
Cisco IOS XE | =16.4.2 | |
Cisco IOS XE | =16.4.3 | |
Cisco IOS XE | =16.5.1 | |
Cisco IOS XE | =16.5.1a | |
Cisco IOS XE | =16.5.1b | |
Cisco IOS XE | =16.5.2 | |
Cisco IOS XE | =16.5.3 | |
Cisco IOS XE | =16.6.1 | |
Cisco IOS XE | =16.6.2 | |
Cisco IOS XE | =16.6.3 | |
Cisco IOS XE | =16.6.4 | |
Cisco IOS XE | =16.6.4a | |
Cisco IOS XE | =16.6.4s | |
Cisco IOS XE | =16.7.1 | |
Cisco IOS XE | =16.7.1a | |
Cisco IOS XE | =16.7.1b | |
Cisco IOS XE | =16.7.2 | |
Cisco IOS XE | =16.8.1 | |
Cisco IOS XE | =16.8.1a | |
Cisco IOS XE | =16.8.1b | |
Cisco IOS XE | =16.8.1c | |
Cisco IOS XE | =16.8.1d | |
Cisco IOS XE | =16.8.1e | |
Cisco IOS XE | =16.8.1s | |
Cisco IOS XE | =16.8.2 | |
Cisco IOS XE | =16.9.1 | |
Cisco IOS XE | =16.9.1a | |
Cisco IOS XE | =16.9.1b | |
Cisco IOS XE | =16.9.1c | |
Cisco IOS XE | =16.9.1d | |
Cisco IOS XE | =16.9.1s | |
Cisco IOS XE | =16.9.2 | |
=3.2.0ja | ||
=16.2.1 | ||
=16.2.2 | ||
=16.3.1 | ||
=16.3.1a | ||
=16.3.2 | ||
=16.3.3 | ||
=16.3.4 | ||
=16.3.5 | ||
=16.3.5b | ||
=16.3.6 | ||
=16.3.7 | ||
=16.4.1 | ||
=16.4.2 | ||
=16.4.3 | ||
=16.5.1 | ||
=16.5.1a | ||
=16.5.1b | ||
=16.5.2 | ||
=16.5.3 | ||
=16.6.1 | ||
=16.6.2 | ||
=16.6.3 | ||
=16.6.4 | ||
=16.6.4a | ||
=16.6.4s | ||
=16.7.1 | ||
=16.7.1a | ||
=16.7.1b | ||
=16.7.2 | ||
=16.8.1 | ||
=16.8.1a | ||
=16.8.1b | ||
=16.8.1c | ||
=16.8.1d | ||
=16.8.1e | ||
=16.8.1s | ||
=16.8.2 | ||
=16.9.1 | ||
=16.9.1a | ||
=16.9.1b | ||
=16.9.1c | ||
=16.9.1d | ||
=16.9.1s | ||
=16.9.2 |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-mgmtacl
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.