First published: Wed Feb 17 2021(Updated: )
A vulnerability in the SSH service of the Cisco StarOS operating system could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error that may occur under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to prevent the targeted service from receiving any traffic, which would lead to a DoS condition on the affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco StarOS | >=21.9.0<=21.19.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-1378.
The severity rating of CVE-2021-1378 is high (7.5).
CVE-2021-1378 can cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition.
The Cisco StarOS operating system versions 21.9.0 through 21.19.10 are affected by CVE-2021-1378.
Apply the necessary updates or patches provided by Cisco to mitigate the vulnerability in the Cisco StarOS operating system.