漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.
漏洞信息
N/A
漏洞
资源管理错误
漏洞
Cisco IOS和IOS XE Internet Key Exchange模块资源管理错误漏洞
漏洞信息
Cisco IOS和IOS XE都是美国思科(Cisco)公司为其网络设备开发的操作系统。Internet Key Exchange Version 2 (IKEv2) module是其中的一个密钥交换协议模块。 Cisco IOS 15.0版本至15.6版本和IOS XE 3.5版本至16.5版本中的IKEv2模块存在资源管理错误漏洞。远程攻击者可通过向受影响的设备发送特定的IKEv2数据包利用该漏洞造成拒绝服务(CPU大量消耗和设备重新加载)。
漏洞信息
N/A
漏洞
N/A