Question: 2. Score 9.9 Attack Vendor > Network. Attack vendor is Network because this Is a DNS traffic that can be intercepted many Hops away.

2. Score 9.9 Attack Vendor > Network. Attack vendor is Network because

2. Score 9.9 Attack Vendor > Network. Attack vendor is Network because this Is a DNS traffic that can be intercepted many Hops away. The attack can be performed as long as the traffic is intercepted before reaching the actual DNS server that the packet was meant for. Attack Complexity > Low. Attack complexity is low because as long as the cisco device is vulnerable, any DNS traffic Can be intercepted and altered. This vulnerability is for over all DNS queries not a specific DNS query. Any DNS query can be altered and expect the same outcome until the device itself is patched. Privileges Required > None. The attacker does not need any privileges to start listening and intercepting DNS traffic. User Interaction > Required. User interaction is required because a user must perform a DNS query for the DNS Server to send a packet through the cisco device to an externa DNS serer. Scope > Changed. Exploiting this vulnerability on a cisco device causes damage in the organization vis Denial of Service. DNS service and traffic flow would be interrupted if the device were to reload. Confidentiality > Low. This attack does not steal any user information but does have access to the DNS queries That are performed in an organization. This is not too important of data. Integrity Impact > Low. The ultimate outcome would be Denial of Service and not affecting the integrity of user Users computer but the DNS server can be impacted. Availability > High. Successful exploitation can cause Denial of Service would very much impact availability of DNS services and even traffic routing.

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Computer Network Questions!