![]() This advisory is available at the following link: There are workarounds that address this vulnerability. ![]() A successful exploit could allow the attacker to use NETCONF or RESTCONF to install, manipulate, or delete the configuration of a network device or to corrupt memory on the device, resulting a DoS.Ĭisco has released software updates that address this vulnerability. ![]() An attacker could exploit this vulnerability by sending a series of NETCONF or RESTCONF requests to an affected device. ![]() This vulnerability is due to an uninitialized variable.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |