MD5 Neighbor Authentication in Extended Interior Gateway Routing
Protocol (EIGRP) 1.2, as implemented in Cisco IOS 11.3 and later, does
not include the Message Authentication Code (MAC) in the checksum,
which allows remote attackers to sniff message hashes and (1) replay
EIGRP HELLO messages or (2) cause a denial of service by sending a
large number of spoofed EIGRP neighbor announcements, which results in
an ARP storm on the local network.
Note:References are provided for the convenience of the reader to help distinguish between vulnerabilities. The list is not intended to be complete.
BUGTRAQ:20051219 Authenticated EIGRP DoS / Information leak
Disclaimer: The entry creation date may reflect when
the CVE-ID was allocated or reserved, and does not
necessarily indicate when this vulnerability was
discovered, shared with the affected vendor, publicly
disclosed, or updated in CVE.
This is an entry on the CVE
list, which standardizes names for security