Impact
An attacker can exploit the SSH service on Cisco IEC6400 Wireless Backhaul Edge Compute Software by sending a flood of connection requests. Because the service lacks effective flood protection, the SSH daemon becomes unresponsive, resulting in a denial of service limited to SSH access. This vulnerability is categorized as CWE‑400 due to uncontrolled resource consumption. The effect is that remote users cannot authenticate via SSH but other device functions continue to operate normally.
Affected Systems
The affected product is the Cisco IEC6400 Wireless Backhaul Edge Compute Software, part of Cisco Ultra‑Reliable Wireless Backhaul. The vendor and product name are provided by Cisco’s CNA. No specific version information is listed in the advisory, so devices of any build that contains the exposed SSH daemon are potentially vulnerable until updated.
Risk and Exploitability
The CVSS base score is 5.3, indicating moderate severity, and the EPSS score is below 1%, suggesting a low likelihood of exploitation in the wild. The vulnerability is not currently listed in the CISA KEV catalog. Exploitation requires no special credentials; an unauthenticated attacker can initiate a DoS by repeatedly targeting the SSH port, causing the service to halt for the duration of the attack. As the rest of the system remains unaffected, the overall impact is a loss of remote management connectivity rather than broader system compromise.
OpenCVE Enrichment