7.1 High
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:M/Au:N/C:N/I:N/A:C
0.02 Low
EPSS
Percentile
88.8%
Certain release trains of Cisco Internetwork Operating System
(IOS)®, when configured to use the IOS Secure Shell
(SSH) server in combination with Terminal Access Controller Access Control
System Plus (TACACS+) as a means to perform remote management tasks on IOS
devices, may contain two vulnerabilities that can potentially cause IOS devices
to exhaust resources and reload. Repeated exploitation of these vulnerabilities
can result in a Denial of Service (DoS) condition. Use of SSH with other
authentication methods like Remote Authentication Dial In User Service (RADIUS)
and the local user database may also be affected.
Cisco has made free software available to address these
vulnerabilities for all affected customers. There are workarounds available to
mitigate the effects of the vulnerability (see the Workarounds[“#workarounds”] section.)
This advisory will be posted at
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20050406-ssh[“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20050406-ssh”].