Description
The Protocol Translation (PT) functionality in Cisco IOS 12.3 through 12.4 and 15.0 through 15.3, when one-step port-23 translation or a Telnet-to-PAD ruleset is configured, does not properly validate TCP connection information, which allows remote attackers to cause a denial of service (device reload) via an attempted connection to a PT resource, aka Bug ID CSCtz35999.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2013-1187 | The Protocol Translation (PT) functionality in Cisco IOS 12.3 through 12.4 and 15.0 through 15.3, when one-step port-23 translation or a Telnet-to-PAD ruleset is configured, does not properly validate TCP connection information, which allows remote attackers to cause a denial of service (device reload) via an attempted connection to a PT resource, aka Bug ID CSCtz35999. |
References
History
No history.
Status: PUBLISHED
Assigner: cisco
Published:
Updated: 2024-09-16T17:28:14.226Z
Reserved: 2013-01-11T00:00:00.000Z
Link: CVE-2013-1147
No data.
Status : Modified
Published: 2013-03-28T23:55:01.627
Modified: 2026-04-29T01:13:23.040
Link: CVE-2013-1147
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD