Cisco warns of NetFlow appliance vulnerability


Cisco today issued a security warning about a potential vulnerability in its NetFlow traffic monitoring device that could cause the system to lock-up.

+More on Network World: Cisco tries to squash Smart Install security abuse+

Specifically, Cisco wrote: “A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition. The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data port. SCTP packets addressed to the IP address of the NGA itself will not trigger this vulnerability. An exploit could allow the attacker to cause the appliance to become unresponsive or reload, causing a DoS condition. User interaction could be needed to recover the device using the reboot command from the CLI.”

Cisco said the vulnerability, which it rated as High, affects NGA models 3140, 3240 and 3340 which typically sit in campus and data center locations and monitor high-throughput Gigabit Ethernet networks.

Leave a Reply

Your email address will not be published. Required fields are marked *