Networks Training

  • About
  • My Books
  • SUGGESTED TRAINING
  • HOME
  • Cisco Networking
    • Cisco General
    • Cisco IOS
    • Cisco VPN
    • Cisco Wireless
  • Cisco ASA
    • Cisco ASA General
    • Cisco ASA Firewall Configuration
  • Certifications Training
    • CCNA Training
    • Cisco Certifications
    • I.T Training
  • General
    • General Networking
    • IP Telephony
    • Network Security
    • Product Reviews
    • Software
  • Cisco Routers
  • Cisco Switches
You are here: Home / Cisco IOS / Six DoS Vulnerabilities in Cisco IOS Software – Patch your devices ASAP

Six DoS Vulnerabilities in Cisco IOS Software – Patch your devices ASAP

Written By Harris Andrea

On March 26, 2014 Cisco has announced six serious security vulnerabilities (five vulnerabilities in Cisco IOS software and one in Cisco 7600 Series Route Switch Processor 720 with 10 Gigabit Ethernet Uplinks). If the vulnerabilities are exploited they can result in Denial of Service condition for the devices.

All six vulnerabilities have a CVSS base score of greaten than 7 (with maximum of 10) which means they are high risk since they can be exploited remotely without authentication.

Here is a summary of the six vulnerabilities:

  • DoS in SIP (Session Initiation Protocol for VoIP) affecting IOS XE Software release 3.10.0S and 3.10.1S
  • The Route Processor of a Cisco 7600 with RSP720 engine can be rebooted or stop forwarding traffic remotely with crafted IP packets.
  • A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of the affected device that would lead to a denial of service (DoS) condition.
  • Malformed DNS packets can crash the NAT in various IOS versions.
  • Certain types of HTTP requests can cause a Denial of Service in the SSL VPN subsystem of Cisco IOS.
  • A malformed IPv6 packet can cause a DoS condition (I/O memory depletion) on IOS and IOS XE devices which have IPv6 enabled.
MORE READING:  Cisco IOS DHCP Configuration

Get the full details of the above with information how to fix them HERE.

There is no evidence that the above vulnerabilities have been exploited in the wild, but if they get exploited in the future, the risk impact will be huge.

Related Posts

  • What is Cisco IOS – Overview and Description of Cisco’s Operating System
  • How to Configure SNMP on Cisco Devices (Routers, Switches)
  • Comparing Cisco IOS Configurations (Config Compare Tools)
  • Cisco Access List Configuration Examples (Standard, Extended ACL) on Routers Etc
  • PPTP Remote Access VPN Configuration on Cisco Routers

Filed Under: Cisco IOS

Download Free Cisco Commands Cheat Sheets

Enter your Email below to Download our Free Cisco Commands Cheat Sheets for Routers, Switches and ASA Firewalls.

We use Elastic Email as our marketing automation service. By submitting this form, you agree that the information you provide will be transferred to Elastic Email for processing in accordance with their Terms of Use and Privacy Policy. Also, you allow me to send you informational and marketing emails from time-to-time.

About Harris Andrea

Harris Andrea is an Engineer with more than two decades of professional experience in the fields of TCP/IP Networks, Information Security and I.T. Over the years he has acquired several professional certifications such as CCNA, CCNP, CEH, ECSA etc.

He is a self-published author of two books ("Cisco ASA Firewall Fundamentals" and "Cisco VPN Configuration Guide") which are available at Amazon and on this website as well.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

Search this site

About Networks Training

We Provide Technical Tutorials and Configuration Examples about TCP/IP Networks with focus on Cisco Products and Technologies. This blog entails my own thoughts and ideas, which may not represent the thoughts of Cisco Systems Inc. This blog is NOT affiliated or endorsed by Cisco Systems Inc. All product names, logos and artwork are copyrights/trademarks of their respective owners.

Amazon Disclosure

As an Amazon Associate I earn from qualifying purchases.
Amazon and the Amazon logo are trademarks of Amazon.com, Inc. or its affiliates.

Search

BLOGROLL

Tech21Century
Firewall.cx

Copyright © 2023 | Privacy Policy | Terms and Conditions | Hire Me | Contact | Amazon Disclaimer | Delivery Policy

0 shares