Cisco IOS 12.0 IPv6 Remote DoS

high Nessus Network Monitor Plugin ID 2558

Synopsis

The remote host is vulnerable to a Denial of Service (DoS) attack.

Description

The remote Cisco device has enabled IPv6. On many Cisco devices, it may be possible to make the remote device crash when sending it malformed IPv6 packets. These vulnerabilities would allow a remote attacker to potentially cause the Cisco machine to reboot repeatedly, causing a loss of availability.

Solution

Ensure that IPv6 functionality is required and then ensure that a patched version of Cisco IOS is installed.

See Also

http://www.cisco.com/warp/public/707/cisco-sa-20050126-ipv6.shtml

Plugin Details

Severity: High

ID: 2558

Family: Generic

Published: 1/26/2005

Updated: 3/6/2019

Risk Information

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.7

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:W/RC:C

Reference Information

BID: 12368