First published: Wed Oct 23 2024(Updated: )
A vulnerability in Internet Key Exchange version 2 (IKEv2) processing of Cisco Secure Client Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) of Cisco Secure Client.This vulnerability is due to an integer underflow condition. An attacker
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Secure |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identified by cisco-sa-csc-dos-XvPhM3bj is classified as a denial of service (DoS) vulnerability.
To mitigate cisco-sa-csc-dos-XvPhM3bj, upgrade to the fixed version of Cisco Secure Client provided in the security advisory.
The vulnerability cisco-sa-csc-dos-XvPhM3bj affects the Cisco Secure Client software.
Yes, cisco-sa-csc-dos-XvPhM3bj can be exploited by an unauthenticated remote attacker.
The cisco-sa-csc-dos-XvPhM3bj vulnerability is caused by an integer underflow condition in IKEv2 processing.