Thursday, 24 December 2015

Cisco Switch Software Vulnerable

Cisco this week issued a security advisory on a vulnerability in its IOS XE software. IOS XE Release 16.1.1 could allow an attacker to cause an affected device to reload.

The vulnerability is due to incorrect processing of packets that have a source MAC address of 0000:0000:0000, the advisory states. An attacker could exploit it by sending a frame that has a source MAC address of all zeros to an affected device.

A successful exploit could allow the attacker to cause the device to reload. All products that run IOS XE Release 16.1.1 are vulnerable, the advisory states. Two of those products are Cisco’s Catalyst 3850 and 3650 series switches.

Cisco has released software updates that address this vulnerability. There are no workarounds that mitigate it, the company says.

The Cisco Product Security Incident Response Team is not aware of any public announcements or malicious use of the vulnerability, the advisory states.

Earlier this week, Cisco said it was reviewing its products to ensure no backdoor corruptions, or “malicious modifications” exist after Juniper announced that its ScreenOS firewall operating system has been vulnerable for years.

No comments:

Post a Comment

Note: only a member of this blog may post a comment.