Vulnerability Note VU#363374
Cisco CSS 11000 Series Content Services Switch vulnerable to DoS via malformed UDP packets
Several models of the Cisco Content Services Switch contain a vulnerability in their management interface that allows an attacker to restart the switch, resulting in a denial of service attack.
The Cisco CSS 11000 Series Content Services Switches contain a vulnerability in their handling of malformed UDP packets. An attacker with access to the management port of an affected switch can send a UDP packet to the app-udp port (5002/udp) that will cause the switch to restart. This vulnerability affects CSS 11000 Series switches that run versions 5.0(x) and 6.10(x) of Cisco WebNS, a service that allows the CSS switch to be configured remotely using an HTML-based application.
Cisco reports that an attacker must have access to the management port of an affected switch, and that this interface is not accessible through other ports on the switch. Therefore, the attacker must have physical access to the switch or to an out-of-band management network that it is connected to. For further details, please see the Cisco Advisory.
Attackers with access to the management interface of an affected switch can restart it repeatedly, resulting in a denial of service.
Upgrade to a newer version of WebNS. For systems running version 5.0(x) of WebNS, upgrade to 05.0(04.07)S or later. For systems running version 6.10(x) of WebNS, upgrade to 06.10(02.05)S or later.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Cisco Systems Inc.||Affected||04 Mar 2004||15 Mar 2004|
CVSS Metrics (Learn More)
This vulnerability was reported by the Cisco Systems Product Security Incident Response Team ( PSIRT ) .
This document was written by Damon Morda and Jeffrey P. Lanza.
- CVE IDs: Unknown
- Date Public: 04 Mar 2004
- Date First Published: 05 Mar 2004
- Date Last Updated: 29 Jul 2004
- Severity Metric: 1.86
- Document Revision: 30
If you have feedback, comments, or additional information about this vulnerability, please send us email.