Lucene search

K
ciscoCiscoCISCO-SA-RCM-TCP-DOS-2WH8XJAQ
HistoryFeb 16, 2022 - 4:00 p.m.

Cisco Redundancy Configuration Manager for Cisco StarOS Software TCP Denial of Service Vulnerability

2022-02-1616:00:00
tools.cisco.com
5

0.001 Low

EPSS

Percentile

49.6%

A vulnerability in the checkpoint manager implementation of Cisco Redundancy Configuration Manager (RCM) for Cisco StarOS Software could allow an unauthenticated, remote attacker to cause the checkpoint manager process to restart upon receipt of malformed TCP data.

This vulnerability is due to improper input validation of an ingress TCP packet. An attacker could exploit this vulnerability by sending crafted TCP data to the affected application. A successful exploit could allow the attacker to cause a denial of service (DoS) condition due to the checkpoint manager process restarting.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-tcp-dos-2Wh8XjAQ [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-rcm-tcp-dos-2Wh8XjAQ”]

Affected configurations

Vulners
Node
ciscoredundancy_configuration_managerMatchanystaros
OR
ciscoredundancy_configuration_managerMatchanystaros

0.001 Low

EPSS

Percentile

49.6%

Related for CISCO-SA-RCM-TCP-DOS-2WH8XJAQ