Cisco IOS Software and IOS XE Software Release 3E HTTP Server Denial of Service Vulnerability
A vulnerability in the HTTP Server feature of Cisco IOS Software and Cisco IOS XE Software Release 3E allows an authenticated remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service condition. The vulnerability is due to improper validation of user-supplied input. An attacker could exploit this vulnerability by sending malformed HTTP requests to an affected device. A successful exploit causes a watchdog timer to expire and the device to reload. To exploit this vulnerability, the attacker must have a valid user account. Cisco has released software updates that address this vulnerability.
- Valid user account credentials (local or AAA-authenticated)
- Network reachability to the device's HTTP server port (default port 80)
- HTTP server feature must be enabled on the device
Patching may require device reboot — plan for process interruption
/api/v1/advisories/c5daf6a8-ce8a-4291-9655-d2f5d62ddf35Get OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.