First published: Wed Oct 02 2019(Updated: )
A vulnerability in the web-based management interface of Cisco IC3000 Industrial Compute Gateway could allow an authenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the affected software improperly manages system resources. An attacker could exploit this vulnerability by opening a large number of simultaneous sessions on the web-based management interface of an affected device. A successful exploit could allow the attacker to cause a DoS condition of the web-based management interface, preventing normal management operations. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20191002-ic3000-icg-dos
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IC3000 Industrial Compute Gateway firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20191002-ic3000-icg-dos is rated as high due to the potential for denial of service conditions.
To fix cisco-sa-20191002-ic3000-icg-dos, you should apply the latest firmware updates provided by Cisco for the IC3000 Industrial Compute Gateway.
Cisco IC3000 Industrial Compute Gateway users who utilize the web-based management interface are affected by cisco-sa-20191002-ic3000-icg-dos.
The potential impacts of cisco-sa-20191002-ic3000-icg-dos include service interruptions and denial of service for affected devices.
Yes, authentication is required for an attacker to exploit cisco-sa-20191002-ic3000-icg-dos and cause a denial of service.