3/24/2024 0 Comments Cisco ios xe ldpeThere is also a mitigation that addresses this vulnerability: To limit the attack surface of this vulnerability, ensure that access control lists (ACLs) are in place for NETCONF and RESTCONF to prevent attempted access from untrusted subnets. For more information, see Cisco Guide to Harden Cisco IOS Devices. There is a workaround that addresses this vulnerability: Remove the enable password and configure an enable secret.For either to be affected, all of the following must be configured: This vulnerability affects Cisco IOS XE Software if it is running in autonomous or controller mode and Cisco IOS XE SD-WAN Software. A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS. An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. This vulnerability is due to an uninitialized variable. Cause memory corruption that results in a denial of service (DoS) on an affected device. ![]() Install, manipulate, or delete the configuration of an affected device.A vulnerability in the authentication, authorization, and accounting (AAA) function of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass NETCONF or RESTCONF authentication and do either of the following:
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |