CVE-2011-2059
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
The ipv6 component in Cisco IOS before 15.1(4)M1.3 allows remote attackers to conduct fingerprinting attacks and obtain potentially sensitive information about the presence of the IOS operating system via an ICMPv6 Echo Request packet containing a Hop-by-Hop (HBH) extension header (EH) with a 0x0c01050c value in the PadN option data, aka Bug ID CSCtq02219.
El componente IPv6 en Cisco IOS anterior a v15.1(4)M1.3 permite a atacantes remotos a realizar ataques para la obtención de datos del servidor (fingerprinter) y obtener información potencialmente sensible acerca de la presencia del sistema operativo IOS a través de un paquete de petición eco ICMPv6 que contenga una cabecera Hop-by-hop (HBH) cabecera de extensión (EH) con un valor 0x0c01050c en los datos de opción PadN, también conocido como Bug ID CSCtq02219.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-05-10 CVE Reserved
- 2011-10-22 CVE Published
- 2024-09-17 CVE Updated
- 2024-09-17 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
CAPEC
References (2)
URL | Tag | Source |
---|---|---|
http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor | Broken Link |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0 | 2020-05-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | < 15.1\(4\)m1.3 Search vendor "Cisco" for product "Ios" and version " < 15.1\(4\)m1.3" | - |
Affected
|