The ipv6 component in Cisco IOS before 15.1(4)M1.3 allows remote attackers to conduct fingerprinting attacks and obtain potentially sensitive information about the presence of the IOS operating system via an ICMPv6 Echo Request packet containing a Hop-by-Hop (HBH) extension header (EH) with a 0x0c01050c value in the PadN option data, aka Bug ID CSCtq02219.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 01:27
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://blogs.cisco.com/security/1999tcp-redux-the-ipv6-flavor - Broken Link | |
| References | () http://tools.cisco.com/security/center/viewIpsSignature.x?signatureId=36606&signatureSubId=0 - Vendor Advisory | 
Information
                Published : 2011-10-22 02:59
Updated : 2025-04-11 00:51
NVD link : CVE-2011-2059
Mitre link : CVE-2011-2059
CVE.ORG link : CVE-2011-2059
JSON object : View
Products Affected
                cisco
- ios
 
CWE
                
                    
                        
                        CWE-200
                        
            Exposure of Sensitive Information to an Unauthorized Actor
