A vulnerability in the HTTP client feature of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to read and modify data that should normally have been sent via an encrypted channel. The vulnerability is due to TCP port information not being considered when matching new requests to existing, persistent HTTP connections. An attacker could exploit this vulnerability by acting as a man-in-the-middle and then reading and/or modifying data that should normally have been sent through an encrypted channel.

Published : 2019-09-25 21:15 Updated : 2019-10-09 23:46

CVSS Score More info
Score 5.8 / 10
Vendor Product Version URI
Cisco Ios 15.6%282%29t cpe:/o:cisco:ios:15.6%282%29t
Cisco Ios fd-1.5.0 cpe:/o:cisco:ios:fd-1.5.0
  1. Cisco (1) Search CVE
    1. Ios (2) Search CVE
      1. 15.6%282%29t
      2. Fd-1.5.0


ID Name Description Links
CWE-326 Inadequate Encryption Strength The software stores or transmits sensitive data using an encryption scheme that is theoretically sound, but is not strong enough for the level of protection required. CVE

History of changes

Date Event
2019-09-27 13:23
2019-09-25 21:32