07-24-2024 01:38 PM
Does anyone know and have concrete documentation whether the TCP Timestamp response vulnerability affects the 2900, 3000 catalyst switches? If so, which version is compromised? I searched for a while, and I mainly found that it's affecting the Cisco 9000 series on 12.2(2f) 13.2(7f) 14.2(3j) releases based on this link.
https://bst.cisco.com/quickview/bug/CSCvs45596
please help
Solved! Go to Solution.
07-24-2024 03:28 PM
@itorr14 wrote:
Does anyone know and have concrete documentation whether the TCP Timestamp response vulnerability affects the 2900, 3000 catalyst switches? If so, which version is compromised? I searched for a while, and I mainly found that it's affecting the Cisco 9000 series on 12.2(2f) 13.2(7f) 14.2(3j) releases based on this link.
https://bst.cisco.com/quickview/bug/CSCvs45596
please help
Bug ID says "Cisco Nexus 9000 Series Fabric Switches". No mention of Catalyst switches.
For more in-depth information, raise a TAC Case.
07-24-2024 03:28 PM
@itorr14 wrote:
Does anyone know and have concrete documentation whether the TCP Timestamp response vulnerability affects the 2900, 3000 catalyst switches? If so, which version is compromised? I searched for a while, and I mainly found that it's affecting the Cisco 9000 series on 12.2(2f) 13.2(7f) 14.2(3j) releases based on this link.
https://bst.cisco.com/quickview/bug/CSCvs45596
please help
Bug ID says "Cisco Nexus 9000 Series Fabric Switches". No mention of Catalyst switches.
For more in-depth information, raise a TAC Case.
Discover and save your favorite ideas. Come back to expert answers, step-by-step guides, recent topics, and more.
New here? Get started with these tips. How to use Community New member guide