First published: Wed Mar 27 2024(Updated: )
A vulnerability in Cisco IOS Software for Cisco Catalyst 6000 Series Switches could allow an unauthenticated, adjacent attacker to cause an affected device to reload unexpectedly.This vulnerability is due to improper handling of process-switched traffic. An attacker could exploit
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco Catalyst 6000 Series Switches |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-ios-dos-Hq4d3tZG is considered high due to the potential for device reloads and impact on network availability.
To fix cisco-sa-ios-dos-Hq4d3tZG, apply the recommended software updates from Cisco for the affected IOS Software and Catalyst 6000 Series Switches.
The affected devices for cisco-sa-ios-dos-Hq4d3tZG include Cisco IOS Software and Cisco Catalyst 6000 Series Switches.
No, an attacker must be adjacent to the network to exploit cisco-sa-ios-dos-Hq4d3tZG.
The vulnerability in cisco-sa-ios-dos-Hq4d3tZG is caused by improper handling of process-switched traffic.