![]() There are workarounds that address this vulnerability. ![]() A successful exploit could allow the attacker to impact the ability to create, modify, or delete VLANs and cause a DoS condition. ![]() An attacker could exploit this vulnerability by sending VTP packets in a sequence that triggers a timeout in the VTP message processing code of the affected software. The vulnerability is due to a logic error in how the affected software handles a subset of VTP packets. A vulnerability in the VLAN Trunking Protocol (VTP) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to corrupt the internal VTP database on an affected device and cause a denial of service (DoS) condition.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |