CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
92.6%
The web administration interface of Cisco Intrusion Prevention System and Intrusion Detection System devices fails to properly handle certain Secure Socket Layer packets. This vulnerability may cause a denial of service.
According to Cisco Security Advisory cisco-sa-20060920-ips:
It is possible to send a malformed SSLv2 Client Hello packet to the IPS/IDS web administration interface, which may cause the process (mainApp) responsible for managing remote access to fail. This results in an IPS/IDS device becoming unresponsive to all future remote management requests through the web administration interface or the command-line interface (CLI) via SSH and the console.
The specific nature of the malformed packets that exploit this vulnerability is unknown. Vulnerable products include Cisco IDS 4.1(x) software prior to 4.1(5c), Cisco IPS 5.0(x) software prior to 5.0(6p1), and Cisco IPS 5.1(x) software prior to 5.1(2).
A remote, unauthenticated attacker could cause the administrative interface of an affected device to become unavailable, leading to various secondary denial of service impacts.
Upgrade
Cisco has made fixed versions of the software available to address these vulnerabilities. For more information see Cisco Security Advisory cisco-sa-20060920-ips.
Apply Access Control List
Users that are unable to upgrade should apply an access control list (ACL) on the vulnerable device to restrict access to trusted management systems. Details on creating and uploading an ACL can be found in Cisco’s Product Configuration Guide.
642076
Filter by status: All Affected Not Affected Unknown
Filter by content: __ Additional information available
__ Sort by: Status Alphabetical
Expand all
Javascript is disabled. Click here to view vendors.
Updated: September 20, 2006
Affected
We have not received a statement from the vendor.
The vendor has not provided us with any further information regarding this vulnerability.
Refer to <http://www.cisco.com/warp/public/707/cisco-sa-20060920-ips.shtml>.
If you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:[email protected]?Subject=VU%23642076 Feedback>).
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
This issue was reported in Cisco Security Advisory cisco-sa-20060920-ips.
This document was written by Chris Taschner.
CVE IDs: | CVE-2006-4910 |
---|---|
Severity Metric: | 3.66 Date Public: |