9 C
London
Wednesday, September 20, 2017
Home Tags Access Control List

Tag: Access Control List

A vulnerability in certain filtering mechanisms of access control listsnbsp;(ACLs) for Cisconbsp;ASR 5000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass ACL rules that have been conf...
A vulnerability in the ternary content addressable memory (TCAM) share access control list (ACL) functionality of Cisco IOS Software running on Supervisor Engine 720 and Supervisor Engine 32 Modules for Cisco Catalyst 6500 Series Switches and Cisco 760...
A vulnerability in the Cisco Adaptive Security Appliance (ASA) Software implementation of access control list (ACL) permit and deny filters for ICMP echo reply messages could allow an unauthenticated, remote attacker to bypass ACL configurations for an affected device.
ICMP traffic that should be denied may instead be allowed through an affected device.The vulnerability is due to the implementation of ACL-based filters for ICMP echo requests and the range of ICMP echo request subtypes.

An attacker could exploit this vulnerability by sending ICMP echo request traffic to an affected device.

A successful exploit could allow the attacker to bypass ACL configurations for the device, which could allow traffic that should be denied to instead be allowed through the device.Cisco has released software updates that address this vulnerability.

There are no workarounds that address this vulnerability.This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160711-asa