漏洞信息
# N/A
## 概述
Cisco IOS Software在Cisco Catalyst 1000 Switches 和Cisco Catalyst 2960L Switches的访问控制列表(ACL)编程中的一个漏洞,可能允许未授权的远程攻击者绕过配置的ACL。
## 影响版本
- Cisco Catalyst 1000 Switches
- Cisco Catalyst 2960L Switches
## 细节
此漏洞是由在同一接口上同时使用IPv4 ACL和动态IP源守护(IP Source Guard)ACL所引起的。这是一个不支持的配置。攻击者可以通过尝试将流量发送到受影响的设备来利用此漏洞。成功的利用可能导致攻击者绕过设备上的ACL。
## 影响
- 漏洞导致未授权用户绕过ACL进行攻击。
- 尽管经过Cisco文档更新以反映这不是一个支持的配置,但Cisco 发布了这个漏洞通告,因为设备不会防止管理员在同一接口上配置这两种功能。
- Cisco 表示没有计划在Cisco Catalyst 1000或Catalyst 2960L Switches上提供同时配置这两种功能的能力。
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
N/A
漏洞描述信息
A vulnerability in the access control list (ACL) programming of Cisco IOS Software that is running on Cisco Catalyst 1000 Switches and Cisco Catalyst 2960L Switches could allow an unauthenticated, remote attacker to bypass a configured ACL.
This vulnerability is due to the use of both an IPv4 ACL and a dynamic ACL of IP Source Guard on the same interface, which is an unsupported configuration. An attacker could exploit this vulnerability by attempting to send traffic through an affected device. A successful exploit could allow the attacker to bypass an ACL on the affected device.
Note: Cisco documentation has been updated to reflect that this is an unsupported configuration. However, Cisco is publishing this advisory because the device will not prevent an administrator from configuring both features on the same interface. There are no plans to implement the ability to configure both features on the same interface on Cisco Catalyst 1000 or Catalyst 2960L Switches.
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:L/A:N
漏洞类别
访问控制不恰当
漏洞标题
Cisco IOS 访问控制错误漏洞
漏洞描述信息
Cisco IOS是美国思科(Cisco)公司的一套为其网络设备开发的操作系统。 Cisco IOS存在访问控制错误漏洞,该漏洞源于访问控制列表配置不当,可能导致绕过ACL限制。
CVSS信息
N/A
漏洞类别
授权问题