Lucene search

K
ciscoCiscoCISCO-SA-20080521-SSH
HistoryMay 21, 2008 - 4:00 p.m.

Cisco IOS Secure Shell Denial of Service Vulnerabilities

2008-05-2116:00:00
tools.cisco.com
9

0.021 Low

EPSS

Percentile

89.2%

The Secure Shell server (SSH) implementation in Cisco IOS contains multiple vulnerabilities that allow unauthenticated users the ability to generate a spurious memory access error or, in certain cases, reload the device.

The IOS SSH server is an optional service that is disabled by default, but its use is highly recommended as a security best practice for management of Cisco IOS devices. SSH can be configured as part of the AutoSecure feature in the initial configuration of IOS devices, AutoSecure run after initial configuration, or manually. SSH is enabled any time RSA keys are generated such as when a http secure-server or trust points for digital certificates are configured. Devices that are not configured to accept SSH connections are not affected by these vulnerabilities.

Common Vulnerabilities and Exposures (CVE) identifier CVE-2008-1159 [“http://nvd.nist.gov/nvd.cfm?cvename=CVE-2008-1159”] has been assigned to this vulnerability.

This advisory is posted at https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20080521-ssh [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20080521-ssh”].

0.021 Low

EPSS

Percentile

89.2%

Related for CISCO-SA-20080521-SSH