Cisco Closes Door on VPN DoS

Monday Jan 30th 2006 by Michael Hall
Share:

Cisco has announced patches for a potential DoS vulnerability in its VPN gear.

Cisco has announced that a vulnerability in some of its VPN hardware has been patched.

On Friday afternoon, the company posted a security advisory noting that its Cisco VPN 3000 series concentrators are vulnerable to a denial of service attack (DoS).

The vulnerability affects only concentrator models 3005, 3015, 3020, 3030, 3060, and 3080; running software 4.7.0 through 4.7.2.A. Additionally, since the vulnerability is particular to the series's HTTP service, it affects only those devices with the service enabled. The HTTP service is enabled by default in the affected devices.

According to the company's advisory, sending a crafted packet to one of the affected devices port 80 could cause it to reload and drop connections, with repeated exploits eventually causing a sustained denial of service.

Cisco said it has posted patches, and that workarounds exist. Replacing use of the HTTP service with the HTTPS service, for instance, will mitigate the vulnerability. The company also recommended protecting devices through the use of infrastructure access control lists (ACLs).

Share:
Home
Mobile Site | Full Site
Copyright 2017 © QuinStreet Inc. All Rights Reserved