First published: Wed Mar 27 2024(Updated: )
A vulnerability in auxiliary asynchronous port (AUX) functions of Cisco IOS XE Software could allow an authenticated, local attacker to cause an affected device to reload or stop responding.This vulnerability is due to the incorrect handling of specific ingress traffic when flow
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-aux-333WBz8f is classified as high due to the potential for an attacker to cause device reload or unresponsiveness.
To fix cisco-sa-aux-333WBz8f, you should apply the recommended software updates provided by Cisco for the affected versions of IOS XE Software.
Devices running affected versions of Cisco IOS XE Software are vulnerable to the issues described in cisco-sa-aux-333WBz8f.
An authenticated, local attacker can exploit cisco-sa-aux-333WBz8f to cause a device to reload or become unresponsive.
The consequences of cisco-sa-aux-333WBz8f include potential disruptions in service as the device may reload or stop responding.