Notice: Function _load_textdomain_just_in_time was called incorrectly. Translation loading for the wp-pagenavi domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home/u918112125/domains/exploit.company/public_html/wp-includes/functions.php on line 6114
Remote Denial-of-Service Vulnerability in Cisco IOS - exploit.company
header-logo
Suggest Exploit
vendor:
Cisco IOS
by:
7.5
CVSS
HIGH
Remote Denial-of-Service
CWE
Product Name: Cisco IOS
Affected Version From: 12
Affected Version To: 12.4
Patch Exists:
Related CWE:
CPE:
Metasploit:
Other Scripts:
Platforms Tested:

Remote Denial-of-Service Vulnerability in Cisco IOS

The vulnerability is caused by the software's failure to handle certain CLI commands. Attackers can trigger this vulnerability by successfully authenticating to vulnerable devices through remote anonymous means or by sending specially crafted input to web interfaces. Successful exploitation allows attackers to trigger device reboots, resulting in a denial of service for legitimate users.

Mitigation:

Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/25352/info

Cisco IOS is prone to a remote denial-of-service vulnerability because the software fails to properly handle certain CLI commands.

To issue commands that trigger this vulnerability, attackers must be able to successfully authenticate to vulnerable devices. This may be achieved through remote anonymous means or by sending specially crafted input to web interfaces such as 'Looking Glass' web applications.

Successfully exploiting this issue allows attackers to trigger device reboots, denying service to legitimate users.

This issue is documented as Cisco bug ID CSCsb08386.

Cisco IOS releases in the 12.0, 12.1, 12.2, 12.3, and 12.4 ranges are vulnerable to this issue. 

show ip bgp regexp (.*)(_\1)+
show ip bgp regexp ([0-9]*)(_\1)+