Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

Cisco IOS Software for Cisco Catalyst 6500 Series Switches and 7600 Series Routers ACL Bypass Vulnerability
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
A vulnerability in the ternary content addressable memory (TCAM) share access control list (ACL) functionality of Cisco IOS Software running on Supervisor Engine 720 and Supervisor Engine 32 Modules for Cisco Catalyst 6500 Series Switches and Cisco 7600 Series Routers could allow an unauthenticated, remote attacker to bypass access control entries (ACEs) in a port access control list (PACL).
Insight
Insight
The vulnerability is due to the improper implementation of PACL logic for ACEs that include a greater than operator, a less than operator, a tcp flag, the established keyword, or the range keyword. An attacker could exploit this vulnerability by sending packets that meet one or more filter criteria through an affected device.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
See the referenced vendor advisory for a solution.