7.8
CVSSv2

CVE-2013-1147

Published: 28/03/2013 Updated: 02/04/2013
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

The Protocol Translation (PT) functionality in Cisco IOS 12.3 up to and including 12.4 and 15.0 up to and including 15.3, when one-step port-23 translation or a Telnet-to-PAD ruleset is configured, does not properly validate TCP connection information, which allows remote malicious users to cause a denial of service (device reload) via an attempted connection to a PT resource, aka Bug ID CSCtz35999.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 15.0

cisco ios 15.1

cisco ios 15.2

cisco ios 15.3

cisco ios 12.4

cisco ios 12.3

Vendor Advisories

The Cisco IOS Software Protocol Translation (PT) feature contains a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition Cisco has released software updates that address this vulnerability Workarounds that mitigate this vulnerability are available This advisory is available at the foll ...