First published: Wed Sep 25 2024(Updated: )
A vulnerability in the access control list (ACL) programming of Cisco IOS Software running on Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches could allow an unauthenticated, remote attacker to bypass a configured ACL.This vulnerability is due to the incorrect handling
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IE-4000 Series Industrial Ethernet Switch | ||
Cisco IE-4010-4S24P Industrial Ethernet Switch | ||
Cisco IE 5000 Series Switches |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-repacl-9eXgnBpD is considered high due to the potential for unauthorized access.
To fix cisco-sa-repacl-9eXgnBpD, update your Cisco IOS Software and switch firmware to the latest versions available.
The affected devices include Cisco Industrial Ethernet 4000, 4010, and 5000 Series Switches.
Yes, cisco-sa-repacl-9eXgnBpD can be exploited remotely by an unauthenticated attacker.
cisco-sa-repacl-9eXgnBpD allows an attacker to bypass configured access control lists (ACLs) on the affected devices.