A vulnerability exists in the Smart Install feature of Cisco Catalyst Switches running Cisco IOS Software that could allow an unauthenticated, remote attacker to perform remote code execution on the affected device. Smart Install uses TCP port 4786 for communication. An established TCP connection with a completed TCP three-way handshake is needed to be able to trigger this vulnerability.
Vendor Status:
Cisco has issued an update to correct this vulnerability.
Disclosure Timeline:
2012-February-17 Updated information in Ciso IOS Software table for Cisco IOS 12.2SXH
2011-December-16 Removed broken link in the Summary section
2011-October-26 Updated Cisco Bug ID information
2011-October-11 Update IOS Software table 12.2SE row
2011-September-30 Update IOS Software table bundled publication first fixed information.
2011-September-28 Initial public release.