Vulnerability Description
The ipv6 component in Cisco IOS before 15.1(4)M1.3 allows remote attackers to conduct fingerprinting attacks and obtain potentially sensitive information about the presence of the IOS operating system via an ICMPv6 Echo Request packet containing a Hop-by-Hop (HBH) extension header (EH) with a 0x0c01050c value in the PadN option data, aka Bug ID CSCtq02219.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Cisco | Ios | < 15.1\(4\)m1.3 |
Related Weaknesses (CWE)
References
- http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavorBroken Link
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signVendor Advisory
- http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavorBroken Link
- http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signVendor Advisory
FAQ
What is CVE-2011-2059?
CVE-2011-2059 is a vulnerability with a CVSS score of 5.0 (MEDIUM). The ipv6 component in Cisco IOS before 15.1(4)M1.3 allows remote attackers to conduct fingerprinting attacks and obtain potentially sensitive information about the presence of the IOS operating system...
How severe is CVE-2011-2059?
CVE-2011-2059 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-2059?
Check the references section above for vendor advisories and patch information. Affected products include: Cisco Ios.