cancel
Showing results for 
Search instead for 
Did you mean: 
cancel
332
Views
0
Helpful
1
Replies

TCP Timestamp Response Vulnerability on 2900, 3000 catalyst switches

itorr14
Level 1
Level 1

Does anyone know and have concrete documentation whether the TCP Timestamp response vulnerability affects the 2900, 3000 catalyst switches? If so, which version is compromised? I searched for a while, and I mainly found that it's affecting the Cisco 9000 series on 12.2(2f) 13.2(7f) 14.2(3j) releases based on this link.

https://bst.cisco.com/quickview/bug/CSCvs45596

please help

 

1 Accepted Solution

Accepted Solutions

Leo Laohoo
Hall of Fame
Hall of Fame

@itorr14 wrote:

Does anyone know and have concrete documentation whether the TCP Timestamp response vulnerability affects the 2900, 3000 catalyst switches? If so, which version is compromised? I searched for a while, and I mainly found that it's affecting the Cisco 9000 series on 12.2(2f) 13.2(7f) 14.2(3j) releases based on this link.

https://bst.cisco.com/quickview/bug/CSCvs45596

please help


Bug ID says "Cisco Nexus 9000 Series Fabric Switches".  No mention of Catalyst switches. 

For more in-depth information, raise a TAC Case.

View solution in original post

1 Reply 1

Leo Laohoo
Hall of Fame
Hall of Fame

@itorr14 wrote:

Does anyone know and have concrete documentation whether the TCP Timestamp response vulnerability affects the 2900, 3000 catalyst switches? If so, which version is compromised? I searched for a while, and I mainly found that it's affecting the Cisco 9000 series on 12.2(2f) 13.2(7f) 14.2(3j) releases based on this link.

https://bst.cisco.com/quickview/bug/CSCvs45596

please help


Bug ID says "Cisco Nexus 9000 Series Fabric Switches".  No mention of Catalyst switches. 

For more in-depth information, raise a TAC Case.