Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
N/A
Vulnerability Description
A vulnerability in the Data-in-Motion (DMo) process installed with the Cisco IOx application environment could allow an unauthenticated, remote attacker to cause a stack overflow that could allow remote code execution with root privileges in the virtual instance running on an affected device. The vulnerability is due to insufficient bounds checking in the DMo process. An attacker could exploit this vulnerability by sending crafted packets that are forwarded to the DMo process for evaluation. The impacts of a successful exploit are limited to the scope of the virtual instance and do not impact the router that is hosting Cisco IOx. This vulnerability affects the following Cisco 800 Series Industrial Integrated Services Routers: Cisco IR809 and Cisco IR829. Cisco IOx Releases 1.0.0.0 and 1.1.0.0 are vulnerable. Cisco Bug IDs: CSCuy52330.
CVSS Information
N/A
Vulnerability Type
内存缓冲区边界内操作的限制不恰当
Vulnerability Title
Cisco IOx Data-in-Motion 安全漏洞
Vulnerability Description
Cisco IOx是美国思科(Cisco)公司的一套为思科物联网网络基础设施(Cisco路由器、交换机等)提供统一托管功能的应用程序。Data-in-Motion(DMo)是其中的一个实时数据交互进程。 与Cisco IOx 1.0.0.0和1.1.0.0版本应用程序环境安装的DMo进程存在安全漏洞。远程攻击者可利用该漏洞以root权限执行任意代码。
CVSS Information
N/A
Vulnerability Type
N/A