漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
A vulnerability in the Data-in-Motion (DMo) process installed with the Cisco IOx application environment could allow an unauthenticated, remote attacker to cause a stack overflow that could allow remote code execution with root privileges in the virtual instance running on an affected device. The vulnerability is due to insufficient bounds checking in the DMo process. An attacker could exploit this vulnerability by sending crafted packets that are forwarded to the DMo process for evaluation. The impacts of a successful exploit are limited to the scope of the virtual instance and do not impact the router that is hosting Cisco IOx. This vulnerability affects the following Cisco 800 Series Industrial Integrated Services Routers: Cisco IR809 and Cisco IR829. Cisco IOx Releases 1.0.0.0 and 1.1.0.0 are vulnerable. Cisco Bug IDs: CSCuy52330.
漏洞信息
N/A
漏洞
内存缓冲区边界内操作的限制不恰当
漏洞
Cisco IOx Data-in-Motion 安全漏洞
漏洞信息
Cisco IOx是美国思科(Cisco)公司的一套为思科物联网网络基础设施(Cisco路由器、交换机等)提供统一托管功能的应用程序。Data-in-Motion(DMo)是其中的一个实时数据交互进程。 与Cisco IOx 1.0.0.0和1.1.0.0版本应用程序环境安装的DMo进程存在安全漏洞。远程攻击者可利用该漏洞以root权限执行任意代码。
漏洞信息
N/A
漏洞
N/A