Information Leakage Using IPv6 Routing Header in Cisco IOS XR (cisco-sa-20070808-IOS-IPv6-leak)

high Nessus Plugin ID 71432


The remote device is missing a vendor-supplied security patch.


Cisco IOS XR contains a vulnerability when processing specially crafted IPv6 packets with a Type 0 Routing Header present. Exploitation of this vulnerability leads to information leakage on affected IOS and IOS XR devices, and can also result in a crash of the affected IOS device. Successful exploitation on an affected device running Cisco IOS XR will not result in a crash of the device itself, but may result in a crash of the IPv6 subsystem.

Cisco has made free software available to address this vulnerability for affected customers. There are workarounds available to mitigate the effects of the vulnerability.


Apply the relevant patch referenced in Cisco Security Advisory cisco-sa-20070808-IOS-IPv6-leak.

See Also

Plugin Details

Severity: High

ID: 71432

File Name: cisco-sa-20070808-IOS-IPv6-leak-iosxr.nasl

Version: 1.11

Type: combined

Family: CISCO

Published: 12/14/2013

Updated: 4/8/2021

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 5.2


Risk Factor: High

Base Score: 9

Temporal Score: 6.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:C

CVSS Score Source: CVE-2007-4285

Vulnerability Information

CPE: cpe:/o:cisco:ios_xr

Required KB Items: Host/Cisco/IOS-XR/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 8/9/2007

Vulnerability Publication Date: 8/8/2007

Reference Information

CVE: CVE-2007-4285