Products & Services
Support

Product Categories


Popular Downloads


Manage Software

How to Buy

For Home

Linksys Products Store
Linksys is now part of Belkin
Products for everyone

All Ordering Options

Training & Events Partners
Guest

Vulnerability Alert

Cisco IOS Software and Cisco Unified Communications Manager Session Initiation Protocol Denial of Service Vulnerability

 
Threat Type:CWE-399: Resource Management Errors
IntelliShield ID:26892
Version:1
First Published:2012 September 26 16:15 GMT
Last Published:2012 September 26 16:15 GMT
Port: 5060, 5061
CVE:CVE-2012-3949
Urgency:Unlikely Use
Credibility:Confirmed
Severity:Mild Damage
CVSS Base:7.8 CVSS Calculator
CVSS Version 2.0
CVSS Temporal:6.4
Related Resources:
View related Security AdvisoryView related BlogView related Event Response
 
 
Version Summary:Cisco IOS Software and Cisco Unified Communications Manager contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service condition on a targeted system. Updates are available.
 
 
Description
Cisco IOS Software and Cisco Unified Communications Manager contain a vulnerability that could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on a targeted system.

The vulnerability is due to improper processing of Session Initiation Protocol (SIP) messages that contain a valid Session Description Protocol (SDP) message by the affected software. An unauthenticated, remote attacker could exploit this vulnerability by sending crafted SIP packets to a targeted device. If successful, the attacker could cause the device to reload, resulting in a DoS condition.

Cisco has confirmed this vulnerability and software updates are available.
 
Warning Indicators
Cisco has published a list of affected Cisco IOS Software releases in the security advisory. The Vendor Announcements section of this alert contains a link to the advisory.

The following Cisco Unified Communications Manager versions are affected:
  • versions 6.1(5) and prior
  • versions 7.0(2) and prior
  • versions 7.1(5b) and prior
  • versions 8.0(3) and prior
  • version 8.5
  • version 8.6
 
IntelliShield Analysis
To exploit this vulnerability, the attacker must send a crafted SIP message that contains a valid SDP message to a targeted system. To achieve this objective, the attacker may need access to trusted, internal network resources. This access requirement reduces the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
 
Vendor Announcements
Cisco has released a security advisory for Cisco bug IDs CSCtw84664, CSCtj33003, and CSCtw66721 at the following links: cisco-sa-20120926-sip and cisco-sa-20120926-cucm
 
Impact
An unauthenticated, remote attacker could exploit this vulnerability to cause a targeted device to reload, resulting in a DoS condition. Repeated exploitation could result in a sustained DoS condition.
 
Technical Information
The vulnerability is due to improper processing of SIP messages that contain a valid SDP message by the affected software when it is configured to use SIP. SDP pass-through must be enabled for a targeted device to be affected by this vulnerability.

An unauthenticated, remote attacker could exploit this vulnerability by sending malicious SIP packets to a vulnerable device via TCP and UDP port 5060 or TCP Transport Layer Security (TLS) port 5061. When the packets are processed, it could cause the device to reload, resulting in a DoS condition.
 
Safeguards
Administrators are advised to apply the appropriate updates.

Administrators are advised to allow only legitimate devices to connect to affected devices.

Administrators are advised to monitor affected systems.

Administrators may consider disabling the SIP process if it is not required. SIP can be disabled by issuing the following commands: sip-ua no transport udp, no transport tcp, and no transport tcp tls.

The Cisco Applied Intelligence team has created the following companion document to guide administrators in identifying and mitigating attempts to exploit this vulnerability prior to applying updated software: cisco-amb-20120926-cucm
 
Patches/Software
Cisco customers with active contracts can obtain updates through the Software Center at the following link: Cisco. Cisco customers without contracts can obtain upgrades by contacting the Cisco Technical Assistance Center at 1-800-553-2447 or 1-408-526-7209 or via e-mail at tac@cisco.com.
 
Alert History
 
Initial Release


Product Sets
 
The security vulnerability applies to the following combinations of products.

Primary Products:
CiscoCisco Unified Communications Manager 6.1 (1), (1a), (1b), (2), (2)SU1, (2)SU1a, (3), (4), (5) | 7.0 Base, (1), (2) | 7.1 Base, (3), (5), (5b) | 8.0 Base, (2c), (3) | 8.5 Base | 8.6 Base
CiscoIOS 12.2B 12.2(15)B, 12.2(15)B1, 12.2(16)B, 12.2(16)B1, 12.2(16)B2, 12.2(16)B3 | 12.2BX 12.2(16)BX, 12.2(16)BX1, 12.2(16)BX2, 12.2(16)BX3 | 12.2CZ 12.2(15)CZ, 12.2(15)CZ1, 12.2(15)CZ2, 12.2(15)CZ3 | 12.2MC 12.2(15)MC1a, 12.2(15)MC1b, 12.2(15)MC1c, 12.2(15)MC2 | 12.2T 12.2(11)T, 12.2(11)T1, 12.2(11)T10, 12.2(11)T11, 12.2(11)T2, 12.2(11)T3, 12.2(11)T4, 12.2(11)T5, 12.2(11)T6, 12.2(11)T7, 12.2(11)T8, 12.2(11)T9, 12.2(13)T, 12.2(13)T1, 12.2(13)T1a, 12.2(13)T10, 12.2(13)T11, 12.2(13)T12, 12.2(13)T13, 12.2(13)T14, 12.2(13)T15, 12.2(13)T16, 12.2(13)T17, 12.2(13)T2, 12.2(13)T3, 12.2(13)T4, 12.2(13)T5, 12.2(13)T6, 12.2(13)T7, 12.2(13)T8, 12.2(13)T8a, 12.2(13)T9, 12.2(15)T, 12.2(15)T1, 12.2(15)T1a, 12.2(15)T10, 12.2(15)T11, 12.2(15)T12, 12.2(15)T12a, 12.2(15)T13, 12.2(15)T14, 12.2(15)T15, 12.2(15)T16, 12.2(15)T17, 12.2(15)T2, 12.2(15)T3, 12.2(15)T4, 12.2(15)T4a, 12.2(15)T4c, 12.2(15)T4d, 12.2(15)T4e, 12.2(15)T5, 12.2(15)T5a, 12.2(15)T6, 12.2(15)T7, 12.2(15)T8, 12.2(15)T9, 12.2(15)T9a | 12.2YC 12.2(2)YC, 12.2(2)YC1, 12.2(2)YC2, 12.2(2)YC3, 12.2(2)YC4 | 12.2YH 12.2(4)YH | 12.2YJ 12.2(8)YJ, 12.2(8)YJ1 | 12.2YL 12.2(8)YL | 12.2YM 12.2(8)YM | 12.2YN 12.2(8)YN, 12.2(8)YN1 | 12.2YT 12.2(11)YT, 12.2(11)YT1, 12.2(11)YT2 | 12.2YU 12.2(11)YU | 12.2YV 12.2(11)YV | 12.2ZC 12.2(11)ZC, 12.2(13)ZC | 12.2ZD 12.2(13)ZD, 12.2(13)ZD1, 12.2(13)ZD2, 12.2(13)ZD3, 12.2(13)ZD4 | 12.2ZE 12.2(13)ZE | 12.2ZF 12.2(13)ZF, 12.2(13)ZF1, 12.2(13)ZF2 | 12.2ZH 12.2(13)ZH, 12.2(13)ZH10, 12.2(13)ZH2, 12.2(13)ZH3, 12.2(13)ZH4, 12.2(13)ZH5, 12.2(13)ZH6, 12.2(13)ZH7, 12.2(13)ZH8, 12.2(13)ZH9 | 12.2ZJ 12.2(15)ZJ, 12.2(15)ZJ1, 12.2(15)ZJ2, 12.2(15)ZJ3, 12.2(15)ZJ4, 12.2(15)ZJ5 | 12.2ZK 12.2(15)ZK, 12.2(15)ZK1, 12.2(15)ZK2, 12.2(15)ZK3, 12.2(15)ZK4, 12.2(15)ZK5, 12.2(15)ZK6 | 12.2ZL 12.2(15)ZL, 12.2(15)ZL1 | 12.2ZN 12.2(15)ZN | 12.2ZO 12.2(15)ZO | 12.2ZP 12.2(13)ZP, 12.2(13)ZP1, 12.2(13)ZP2, 12.2(13)ZP3, 12.2(13)ZP4 | 12.2ZR 12.2(15)ZR | 12.2ZS 12.2(15)ZS1, 12.2(15)ZS2, 12.2(15)ZS3, 12.2(15)ZS4, 12.2(15)ZS5 | 12.2ZT 12.2(13)ZT | 12.3 12.3(1), 12.3(1a), 12.3(3), 12.3(3a), 12.3(3b), 12.3(3c), 12.3(3d), 12.3(3e), 12.3(3f), 12.3(3g), 12.3(3h), 12.3(3i), 12.3(5), 12.3(5a), 12.3(5b), 12.3(5c), 12.3(5d), 12.3(5e), 12.3(5f), 12.3(6), 12.3(6a), 12.3(6b), 12.3(6c), 12.3(6d), 12.3(6e), 12.3(6f), 12.3(9), 12.3(9a), 12.3(9b), 12.3(9c), 12.3(9d), 12.3(9e), 12.3(10), 12.3(10a), 12.3(10b), 12.3(10c), 12.3(10d), 12.3(10e), 12.3(10f), 12.3(12), 12.3(12a), 12.3(12b), 12.3(12c), 12.3(12d), 12.3(12e), 12.3(13), 12.3(13a), 12.3(13b), 12.3(15), 12.3(15a), 12.3(15b), 12.3(16), 12.3(16a), 12.3(17), 12.3(17a), 12.3(17b), 12.3(17c), 12.3(18), 12.3(18a), 12.3(19), 12.3(19a), 12.3(20), 12.3(20a), 12.3(21), 12.3(21a), 12.3(21b), 12.3(22), 12.3(22a), 12.3(23), 12.3(24), 12.3(24a), 12.3(25), 12.3(26) | 12.3B 12.3(1a)B, 12.3(3)B, 12.3(3)B1, 12.3(5a)B, 12.3(5a)B0a, 12.3(5a)B1, 12.3(5a)B2, 12.3(5a)B3, 12.3(5a)B4, 12.3(5a)B5 | 12.3M 12.3(9)M0, 12.3(9)M1, 12.3(10a)M0 | 12.3T 12.3(2)T, 12.3(2)T1, 12.3(2)T2, 12.3(2)T3, 12.3(2)T4, 12.3(2)T5, 12.3(2)T6, 12.3(2)T7, 12.3(2)T8, 12.3(2)T9, 12.3(4)T, 12.3(4)T1, 12.3(4)T10, 12.3(4)T11, 12.3(4)T12, 12.3(4)T2, 12.3(4)T2a, 12.3(4)T3, 12.3(4)T4, 12.3(4)T5, 12.3(4)T6, 12.3(4)T7, 12.3(4)T8, 12.3(4)T9, 12.3(7)T, 12.3(7)T1, 12.3(7)T10, 12.3(7)T11, 12.3(7)T12, 12.3(7)T2, 12.3(7)T3, 12.3(7)T4, 12.3(7)T5, 12.3(7)T6, 12.3(7)T7, 12.3(7)T8, 12.3(7)T9, 12.3(8)T, 12.3(8)T1, 12.3(8)T10, 12.3(8)T11, 12.3(8)T2, 12.3(8)T3, 12.3(8)T4, 12.3(8)T5, 12.3(8)T6, 12.3(8)T7, 12.3(8)T8, 12.3(8)T9, 12.3(11)T, 12.3(11)T1, 12.3(11)T10, 12.3(11)T11, 12.3(11)T12, 12.3(11)T2, 12.3(11)T2a, 12.3(11)T3, 12.3(11)T4, 12.3(11)T5, 12.3(11)T6, 12.3(11)T7, 12.3(11)T8, 12.3(11)T9, 12.3(14)T, 12.3(14)T1, 12.3(14)T2, 12.3(14)T3, 12.3(14)T4, 12.3(14)T5, 12.3(14)T6, 12.3(14)T7 | 12.3TPC 12.3(4)TPC11b | 12.3XA 12.3(2)XA, 12.3(2)XA1, 12.3(2)XA4, 12.3(2)XA6 | 12.3XB 12.3(2)XB, 12.3(2)XB1, 12.3(2)XB3 | 12.3XC 12.3(2)XC, 12.3(2)XC1, 12.3(2)XC2, 12.3(2)XC3, 12.3(2)XC5 | 12.3XD 12.3(4)XD, 12.3(4)XD1, 12.3(4)XD2, 12.3(4)XD3, 12.3(4)XD4 | 12.3XE 12.3(2)XE, 12.3(2)XE1, 12.3(2)XE5 | 12.3XF 12.3(2)XF | 12.3XG 12.3(4)XG, 12.3(4)XG1, 12.3(4)XG2, 12.3(4)XG3, 12.3(4)XG4, 12.3(4)XG5 | 12.3XH 12.3(4)XH, 12.3(4)XH1 | 12.3XI 12.3(7)XI, 12.3(7)XI10a, 12.3(7)XI2, 12.3(7)XI2b, 12.3(7)XI3, 12.3(7)XI4, 12.3(7)XI5, 12.3(7)XI6, 12.3(7)XI7, 12.3(7)XI7a, 12.3(7)XI7b, 12.3(7)XI8, 12.3(7)XI8bc, 12.3(7)XI8g | 12.3XJ 12.3(7)XJ, 12.3(7)XJ1, 12.3(7)XJ2 | 12.3XK 12.3(4)XK, 12.3(4)XK1, 12.3(4)XK2, 12.3(4)XK3, 12.3(4)XK4 | 12.3XL 12.3(7)XL, 12.3(11)XL, 12.3(11)XL1, 12.3(11)XL2, 12.3(11)XL3 | 12.3XM 12.3(7)XM | 12.3XN 12.3(4)XN, 12.3(4)XN1, 12.3(4)XN2 | 12.3XQ 12.3(4)XQ, 12.3(4)XQ1 | 12.3XR 12.3(7)XR, 12.3(7)XR3, 12.3(7)XR4, 12.3(7)XR5, 12.3(7)XR6, 12.3(7)XR7 | 12.3XU 12.3(8)XU2, 12.3(8)XU3, 12.3(8)XU4, 12.3(8)XU5 | 12.3XW 12.3(8)XW, 12.3(8)XW1, 12.3(8)XW1a, 12.3(8)XW1b, 12.3(8)XW2, 12.3(8)XW3 | 12.3XX 12.3(8)XX, 12.3(8)XX1, 12.3(8)XX2d, 12.3(8)XX2e | 12.3XY 12.3(8)XY, 12.3(8)XY1, 12.3(8)XY2, 12.3(8)XY3, 12.3(8)XY4, 12.3(8)XY5, 12.3(8)XY6, 12.3(8)XY7 | 12.3XZ 12.3(2)XZ1, 12.3(2)XZ2 | 12.3YB 12.3(7)YB, 12.3(7)YB1 | 12.3YC 12.3(8)YC, 12.3(8)YC1, 12.3(8)YC2, 12.3(8)YC3 | 12.3YE 12.3(4)YE, 12.3(4)YE1 | 12.3YF 12.3(11)YF, 12.3(11)YF1, 12.3(11)YF2, 12.3(11)YF3, 12.3(11)YF4 | 12.3YG 12.3(8)YG, 12.3(8)YG2, 12.3(8)YG3, 12.3(8)YG4, 12.3(8)YG6 | 12.3YK 12.3(11)YK, 12.3(11)YK1, 12.3(11)YK2 | 12.3YL 12.3(11)YL, 12.3(11)YL1, 12.3(11)YL2 | 12.3YM 12.3(14)YM1, 12.3(14)YM10, 12.3(14)YM11, 12.3(14)YM12, 12.3(14)YM13, 12.3(14)YM2, 12.3(14)YM3, 12.3(14)YM4, 12.3(14)YM5, 12.3(14)YM6, 12.3(14)YM7, 12.3(14)YM8, 12.3(14)YM9 | 12.3YN 12.3(11)YN | 12.3YQ 12.3(14)YQ, 12.3(14)YQ1, 12.3(14)YQ2, 12.3(14)YQ3, 12.3(14)YQ4, 12.3(14)YQ5, 12.3(14)YQ6, 12.3(14)YQ7, 12.3(14)YQ8 | 12.3YR 12.3(11)YR, 12.3(11)YR1 | 12.3YS 12.3(11)YS2 | 12.3YT 12.3(14)YT, 12.3(14)YT1 | 12.3YU 12.3(14)YU, 12.3(14)YU1 | 12.3YX 12.3(14)YX, 12.3(14)YX1, 12.3(14)YX10, 12.3(14)YX11, 12.3(14)YX12, 12.3(14)YX13, 12.3(14)YX14, 12.3(14)YX15, 12.3(14)YX16, 12.3(14)YX17, 12.3(14)YX2, 12.3(14)YX3, 12.3(14)YX4, 12.3(14)YX7, 12.3(14)YX8, 12.3(14)YX9 | 12.3YZ 12.3(11)YZ, 12.3(11)YZ1, 12.3(11)YZ2 | 12.3ZA 12.3(8)ZA, 12.3(8)ZA1 | 12.3ZB 12.3(11)ZB, 12.3(11)ZB1, 12.3(11)ZB2 | 12.4 12.4(1), 12.4(1a), 12.4(1b), 12.4(1c), 12.4(3), 12.4(3a), 12.4(3b), 12.4(3c), 12.4(3d), 12.4(3e), 12.4(3f), 12.4(3g), 12.4(3h), 12.4(3i), 12.4(3j), 12.4(5), 12.4(5a), 12.4(5b), 12.4(5c), 12.4(7), 12.4(7a), 12.4(7b), 12.4(7c), 12.4(7d), 12.4(7e), 12.4(7f), 12.4(7g), 12.4(7h), 12.4(8), 12.4(8a), 12.4(8b), 12.4(8c), 12.4(8d), 12.4(10), 12.4(10a), 12.4(10b), 12.4(10c), 12.4(12), 12.4(12a), 12.4(12b), 12.4(12c), 12.4(13), 12.4(13a), 12.4(13b), 12.4(13c), 12.4(13d), 12.4(13e), 12.4(13f), 12.4(16), 12.4(16a), 12.4(16b), 12.4(17), 12.4(17a), 12.4(17b), 12.4(18), 12.4(18a), 12.4(18b), 12.4(18c), 12.4(18d), 12.4(18e), 12.4(19), 12.4(21), 12.4(21a), 12.4(23), 12.4(23a), 12.4(23b), 12.4(23c), 12.4(23d), 12.4(23e), 12.4(25), 12.4(25a), 12.4(25b), 12.4(25c), 12.4(25d), 12.4(25e), 12.4(25f) | 12.4GC 12.4(22)GC1, 12.4(22)GC1a, 12.4(24)GC1, 12.4(24)GC3, 12.4(24)GC3a, 12.4(24)GC4 | 12.4M 12.4(5a)M0, 12.4(21a)M1, 12.4(23b)M1 | 12.4MR 12.4(2)MR, 12.4(2)MR1, 12.4(4)MR, 12.4(4)MR1, 12.4(6)MR, 12.4(6)MR1, 12.4(9)MR, 12.4(11)MR, 12.4(12)MR, 12.4(12)MR1, 12.4(12)MR2, 12.4(16)MR, 12.4(16)MR1, 12.4(16)MR2, 12.4(19)MR, 12.4(19)MR1, 12.4(19)MR2, 12.4(20)MR, 12.4(20)MR2 | 12.4MRA 12.4(20)MRA, 12.4(20)MRA1 | 12.4MRB 12.4(20)MRB, 12.4(20)MRB1 | 12.4T 12.4(2)T, 12.4(2)T1, 12.4(2)T2, 12.4(2)T3, 12.4(2)T4, 12.4(2)T5, 12.4(2)T6, 12.4(4)T, 12.4(4)T1, 12.4(4)T2, 12.4(4)T3, 12.4(4)T4, 12.4(4)T5, 12.4(4)T6, 12.4(4)T7, 12.4(4)T8, 12.4(6)T, 12.4(6)T1, 12.4(6)T10, 12.4(6)T11, 12.4(6)T12, 12.4(6)T2, 12.4(6)T3, 12.4(6)T4, 12.4(6)T5, 12.4(6)T5a, 12.4(6)T5b, 12.4(6)T6, 12.4(6)T7, 12.4(6)T8, 12.4(6)T9, 12.4(9)T, 12.4(9)T0a, 12.4(9)T1, 12.4(9)T2, 12.4(9)T3, 12.4(9)T4, 12.4(9)T5, 12.4(9)T6, 12.4(9)T7, 12.4(11)T, 12.4(11)T1, 12.4(11)T2, 12.4(11)T3, 12.4(11)T4, 12.4(15)T, 12.4(15)T1, 12.4(15)T10, 12.4(15)T11, 12.4(15)T12, 12.4(15)T13, 12.4(15)T13b, 12.4(15)T14, 12.4(15)T15, 12.4(15)T16, 12.4(15)T2, 12.4(15)T3, 12.4(15)T4, 12.4(15)T5, 12.4(15)T6, 12.4(15)T6a, 12.4(15)T7, 12.4(15)T8, 12.4(15)T9, 12.4(20)T, 12.4(20)T1, 12.4(20)T2, 12.4(20)T3, 12.4(20)T4, 12.4(20)T5, 12.4(20)T5a, 12.4(20)T6, 12.4(22)T, 12.4(22)T1, 12.4(22)T2, 12.4(22)T3, 12.4(22)T4, 12.4(22)T5, 12.4(24)T, 12.4(24)T1, 12.4(24)T2, 12.4(24)T3, 12.4(24)T4, 12.4(24)T5, 12.4(24)T6 | 12.4XA 12.4(2)XA, 12.4(2)XA1, 12.4(2)XA2 | 12.4XB 12.4(2)XB, 12.4(2)XB1, 12.4(2)XB10, 12.4(2)XB11, 12.4(2)XB2, 12.4(2)XB3, 12.4(2)XB4, 12.4(2)XB5, 12.4(2)XB6, 12.4(2)XB7, 12.4(2)XB8, 12.4(2)XB9 | 12.4XC 12.4(4)XC, 12.4(4)XC1, 12.4(4)XC2, 12.4(4)XC3, 12.4(4)XC4, 12.4(4)XC5, 12.4(4)XC6, 12.4(4)XC7 | 12.4XD 12.4(4)XD, 12.4(4)XD1, 12.4(4)XD10, 12.4(4)XD11, 12.4(4)XD12, 12.4(4)XD2, 12.4(4)XD3, 12.4(4)XD4, 12.4(4)XD5, 12.4(4)XD6, 12.4(4)XD7, 12.4(4)XD8, 12.4(4)XD9 | 12.4XE 12.4(6)XE, 12.4(6)XE1, 12.4(6)XE2, 12.4(6)XE3 | 12.4XG 12.4(9)XG2 | 12.4XJ 12.4(11)XJ, 12.4(11)XJ1, 12.4(11)XJ2, 12.4(11)XJ3, 12.4(11)XJ4, 12.4(11)XJ5, 12.4(11)XJ6 | 12.4XL 12.4(15)XL, 12.4(15)XL1, 12.4(15)XL2, 12.4(15)XL3, 12.4(15)XL4, 12.4(15)XL5 | 12.4XM 12.4(15)XM1, 12.4(15)XM2 | 12.4XP 12.4(6)XP | 12.4XT 12.4(6)XT, 12.4(6)XT1, 12.4(6)XT2 | 12.4XV 12.4(11)XV, 12.4(11)XV1 | 12.4XW 12.4(11)XW, 12.4(11)XW1, 12.4(11)XW10, 12.4(11)XW2, 12.4(11)XW3, 12.4(11)XW4, 12.4(11)XW5, 12.4(11)XW6, 12.4(11)XW7, 12.4(11)XW8, 12.4(11)XW9 | 12.4XY 12.4(15)XY, 12.4(15)XY1, 12.4(15)XY2, 12.4(15)XY3, 12.4(15)XY4, 12.4(15)XY5 | 12.4XZ 12.4(15)XZ, 12.4(15)XZ1, 12.4(15)XZ2 | 12.4YA 12.4(20)YA, 12.4(20)YA1, 12.4(20)YA2, 12.4(20)YA3 | 12.4YB 12.4(22)YB, 12.4(22)YB1, 12.4(22)YB4, 12.4(22)YB5, 12.4(22)YB6, 12.4(22)YB7, 12.4(22)YB8 | 15.0M 15.0(1)M, 15.0(1)M1, 15.0(1)M2, 15.0(1)M3, 15.0(1)M4, 15.0(1)M5, 15.0(1)M6, 15.0(1)M7 | 15.0XA 15.0(1)XA, 15.0(1)XA1, 15.0(1)XA2, 15.0(1)XA3, 15.0(1)XA4, 15.0(1)XA5 | 15.1GC 15.1(2)GC, 15.1(2)GC1 | 15.1T 15.1(1)T, 15.1(1)T1, 15.1(1)T2, 15.1(1)T3, 15.1(2)T, 15.1(2)T0a, 15.1(2)T1, 15.1(2)T2, 15.1(2)T2a, 15.1(2)T3, 15.1(2)T4, 15.1(3)T, 15.1(3)T1 | 15.1XB 15.1(1)XB, 15.1(1)XB1, 15.1(1)XB2, 15.1(1)XB3

Associated Products:
N/A




Alerts and bulletins on the Cisco Security Intelligence Operations Portal are highlighted by analysts in the Cisco Threat Operations Center and represent a subset of the comprehensive content that is available through Cisco Security IntelliShield Alert Manager Service. This customizable threat and vulnerability alert service provides security staff with access to timely, accurate, and credible information about threats and vulnerabilities that may affect their environment.


LEGAL DISCLAIMER
The urgency and severity ratings of this alert are not tailored to individual users; users may value alerts differently based upon their network configurations and circumstances. THE ALERT, AND INFORMATION CONTAINED THEREIN, ARE PROVIDED ON AN "AS IS" BASIS AND DO NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE ALERT, AND INFORMATION CONTAINED THEREIN, OR MATERIALS LINKED FROM THE ALERT, IS AT YOUR OWN RISK. INFORMATION IN THIS ALERT AND ANY RELATED COMMUNICATIONS IS BASED ON OUR KNOWLEDGE AT THE TIME OF PUBLICATION AND IS SUBJECT TO CHANGE WITHOUT NOTICE. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE ALERTS AT ANY TIME.
Powered by  IntelliShield