Cisco Systems, Inc. Information for VU#415294

The Border Gateway Protocol relies on persistent TCP sessions without specifying authentication requirements



Vendor Statement

Cisco systems is vulnerable. Please see:

Please see Cisco's response to the Cansecwest presentation of this vulnerability:

    Vendor Information

    The vendor has not provided us with any further information regarding this vulnerability.

    Vendor References



    The CERT/CC has no additional comments at this time.

    If you have feedback, comments, or additional information about this vulnerability, please send us email.