This script is (C) 2010-2016 Tenable Network Security, Inc.
The remote device is missing a vendor-supplied security patch
Cisco IOS Software contains a flaw that permits the successful
prediction of TCP Initial Sequence Numbers.
This vulnerability is present in all released versions of Cisco IOS
software running on Cisco routers and switches. It only affects the
security of TCP connections that originate or terminate on the affected
Cisco device itself; it does not apply to TCP traffic forwarded through
the affected device in transit between two other hosts.
To remove the vulnerability, Cisco is offering free software upgrades
for all affected platforms. The defect is described in DDTS record
Workarounds are available that limit or deny successful exploitation
of the vulnerability by filtering traffic containing forged IP source
addresses at the perimeter of a network or directly on individual
See also :
Apply the relevant patch referenced in Cisco Security Advisory
Risk factor :
High / CVSS Base Score : 7.5
CVSS Temporal Score : 6.2
Public Exploit Available : true