First published: Wed Sep 27 2017(Updated: )
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20170927-ike is considered high due to the potential for remote attackers to impact system resources.
To fix cisco-sa-20170927-ike, you should apply the relevant software updates or patches provided by Cisco for your affected IOS or IOS XE versions.
cisco-sa-20170927-ike affects devices running Cisco IOS Software and Cisco IOS XE Software.
The potential impacts of cisco-sa-20170927-ike include high CPU utilization, traceback messages, and possible device reloads.
No, the attack described in cisco-sa-20170927-ike can be executed by an unauthenticated remote attacker.