How to Buy
This script is Copyright (C) 2014-2017 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch.
According to its self-reported version, the version of Cisco IOS XR
running on the remote host is affected by a denial of service
vulnerability due to the improper handling of IPv6 packets. A remote,
unauthenticated attacker can cause the device to lock up by rapidly
sending specially crafted IPv6 packets.
Note that this issue only affects Trident-based line cards on Cisco
ASR 9000 series routers. Also, if IPv6 is not enabled, the device can
still be exploited by a host on an adjacent network.
See also :
Apply the relevant patch referenced in Cisco Security Advisory
Risk factor :
High / CVSS Base Score : 7.1
CVSS Temporal Score : 6.2
Public Exploit Available : true
Nessus Plugin ID: 76312 ()
Bugtraq ID: 68005
CVE ID: CVE-2014-2176
Get Nessus Professional to scan unlimited IPs, run compliance checks & more
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.