First published: Wed Mar 27 2024(Updated: )
A vulnerability in the Locator ID Separation Protocol (LISP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.This vulnerability is due to the incorrect handling of LISP packets. An attacker
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-lisp-3gYXs3qP vulnerability is classified as critical due to its potential to cause device reloads by unauthorized remote attackers.
To mitigate the cisco-sa-lisp-3gYXs3qP vulnerability, you should upgrade to a non-vulnerable version of Cisco IOS or IOS XE Software as recommended in Cisco's advisory.
The vulnerability cisco-sa-lisp-3gYXs3qP affects Cisco IOS and Cisco IOS XE Software running on various Cisco devices that utilize the Locator ID Separation Protocol.
Exploitation of the cisco-sa-lisp-3gYXs3qP vulnerability could lead to a denial of service condition through unexpected device reloads.
Yes, cisco-sa-lisp-3gYXs3qP is exploitable by unauthenticated remote attackers targeting vulnerable devices.