Cisco Systems, Inc. Information for VU#415294

The Border Gateway Protocol relies on persistent TCP sessions without specifying authentication requirements

Status

Affected

Vendor Statement

Cisco systems is vulnerable. Please see:


Please see Cisco's response to the Cansecwest presentation of this vulnerability:
    http://www.cansecwest.com/csw04/csw04-Ahlawat.ppt

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Vendor References

    None

    Addendum

    The CERT/CC has no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.