Cisco IOS IPv6 Packet ACL Restriction Bypass

medium Nessus Plugin ID 76346

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported IOS version, the remote device is affected by a security bypass vulnerability.

The flaw is due to the handling of specially crafted IPv6 packets in an unspecified scenario. A remote attacker, with a specially crafted request, could bypass the ACL restrictions on the interface.

Solution

Upgrade to one of the non-vulnerable versions listed in the bug details for CSCty73682.

See Also

https://tools.cisco.com/bugsearch/bug/CSCty73682/

http://www.nessus.org/u?f3955e46

Plugin Details

Severity: Medium

ID: 76346

File Name: cisco_ios_CSCty73682.nasl

Version: 1.3

Type: local

Family: CISCO

Published: 7/2/2014

Updated: 11/15/2018

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 5/8/2013

Vulnerability Publication Date: 5/8/2013

Reference Information

CVE: CVE-2012-3946

BID: 68261

CISCO-BUG-ID: CSCty73682