How to Buy
This script is (C) 2002-2014 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
When an 802.1x (IEEE standard for port based network access control)
frame is received by an affected Catalyst 5000 series switch on a STP
(Spanning Tree Protocol) blocked port it is forwarded in that VLAN
(Virtual Local Area Network) instead of being dropped. This causes a
performance impacting 802.1x frames network storm in that part of the
network, which is made up of the affected Catalyst 5000 series
switches. This network storm only subsides when the source of the
802.1x frames is removed or one of the workarounds in the workaround
section is applied.
This vulnerability is documented as Cisco bug ID CSCdt62732.
Risk factor :
Medium / CVSS Base Score : 5.0
CVSS Temporal Score : 3.7
Public Exploit Available : false
Nessus Plugin ID: 10980 (CSCdt62732.nasl)
Bugtraq ID: 2604
CVE ID: CVE-2001-0429
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.