Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2019-01317

Опубликовано: 27 мар. 2019
Источник: fstec
CVSS3: 7.5
CVSS2: 7.8
EPSS Низкий

Описание

Уязвимость реализации технологии Network-Based Application Recognition в операционных системах Cisco IOS и Cisco IOS XE существует из-за ошибок синтаксического анализа DNS-пакетов. Эксплуатация уязвимости может позволить нарушителю, действующему удаленно, не прошедшему проверку подлинности, вызвать перезагрузку уязвимого устройства, приводящую к отказу в обслуживании путем отправки специально сформированных DNS-пакетов

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS
Cisco IOS XE

Версия ПО

15.6(1)T0a (Cisco IOS)
15.5(3)M (Cisco IOS)
3.16.1as (Cisco IOS XE)
3.16.2as (Cisco IOS XE)
3.16.2s (Cisco IOS XE)
3.17.0s (Cisco IOS XE)
3.17.1s (Cisco IOS XE)
3.18.0s (Cisco IOS XE)
16.5.1 (Cisco IOS XE)
3.2.0JA (Cisco IOS XE)
16.3.1a (Cisco IOS XE)
16.5.1a (Cisco IOS XE)
16.2.1 (Cisco IOS XE)
15.5(3)S (Cisco IOS)
15.5(3)S1 (Cisco IOS)
15.5(3)S1a (Cisco IOS)
15.5(3)S0a (Cisco IOS)
15.5(3)S3 (Cisco IOS)
15.5(3)S4 (Cisco IOS)
15.5(3)S5 (Cisco IOS)
15.5(3)M1 (Cisco IOS)
15.5(3)M0a (Cisco IOS)
15.5(3)M2 (Cisco IOS)
15.5(3)M3 (Cisco IOS)
15.5(3)M4 (Cisco IOS)
15.5(3)M4a (Cisco IOS)
15.5(3)M5 (Cisco IOS)
15.5(3)SN (Cisco IOS)
15.6(1)S (Cisco IOS)
15.6(2)S (Cisco IOS)
15.6(2)S1 (Cisco IOS)
15.6(1)S1 (Cisco IOS)
15.6(1)S2 (Cisco IOS)
15.6(2)S2 (Cisco IOS)
15.6(1)S3 (Cisco IOS)
15.6(2)S3 (Cisco IOS)
15.6(1)S4 (Cisco IOS)
15.6(2)S4 (Cisco IOS)
15.6(1)T (Cisco IOS)
15.6(2)T (Cisco IOS)
15.6(1)T1 (Cisco IOS)
15.6(2)T1 (Cisco IOS)
15.6(1)T2 (Cisco IOS)
15.6(2)SN (Cisco IOS)
15.3(3)JD8 (Cisco IOS)
15.6(3)M (Cisco IOS)
15.6(3)M1 (Cisco IOS)
15.6(3)M0a (Cisco IOS)
15.6(3)M1b (Cisco IOS)
15.3(3)JF2 (Cisco IOS)
15.1(4)M12c (Cisco IOS)
15.1(2)SG8a (Cisco IOS)
15.6(2)SP3b (Cisco IOS)
15.2(2a)E1 (Cisco IOS)
15.1(3)SVG3d (Cisco IOS)
16.2.2 (Cisco IOS XE)
16.3.1 (Cisco IOS XE)
16.3.2 (Cisco IOS XE)
16.3.3 (Cisco IOS XE)
16.3.4 (Cisco IOS XE)
16.4.1 (Cisco IOS XE)
16.4.3 (Cisco IOS XE)
3.16.1S (Cisco IOS XE)
3.16.0bS (Cisco IOS XE)
3.16.0cS (Cisco IOS XE)
3.16.3S (Cisco IOS XE)
3.16.2bS (Cisco IOS XE)
3.16.4aS (Cisco IOS XE)
3.16.4bS (Cisco IOS XE)
3.16.4gS (Cisco IOS XE)
3.16.5S (Cisco IOS XE)
3.16.4cS (Cisco IOS XE)
3.16.4dS (Cisco IOS XE)
3.16.4eS (Cisco IOS XE)
3.16.5aS (Cisco IOS XE)
3.17.2S (Cisco IOS XE)
3.17.1aS (Cisco IOS XE)
3.17.3S (Cisco IOS XE)
3.17.4S (Cisco IOS XE)
16.4.2 (Cisco IOS XE)
16.5.1b (Cisco IOS XE)
15.2(4a)EA5 (Cisco IOS)
15.1(3)SVI1b (Cisco IOS)
15.3(3)JF35 (Cisco IOS)
15.1(3)SVM3 (Cisco IOS)
15.1(3)SVN2 (Cisco IOS)
15.1(3)SVO1 (Cisco IOS)
15.1(3)SVO2 (Cisco IOS)
15.3(3)JI2 (Cisco IOS)
15.1(3)SVP1 (Cisco IOS)
3.16.0aS (Cisco IOS XE)
3.16.3aS (Cisco IOS XE)
3.16.4S (Cisco IOS XE)
3.18.0aS (Cisco IOS XE)
3.18.1S (Cisco IOS XE)
3.18.2S (Cisco IOS XE)
3.18.3S (Cisco IOS XE)
3.18.4S (Cisco IOS XE)
3.18.0SP (Cisco IOS XE)
3.18.1SP (Cisco IOS XE)
3.18.1aSP (Cisco IOS XE)
3.18.1gSP (Cisco IOS XE)
3.18.1bSP (Cisco IOS XE)
3.18.1cSP (Cisco IOS XE)
3.18.2SP (Cisco IOS XE)
3.18.1hSP (Cisco IOS XE)
3.18.2aSP (Cisco IOS XE)
3.18.1iSP (Cisco IOS XE)
15.5(3)M4b (Cisco IOS)
15.5(3)M4c (Cisco IOS)
15.5(3)M5a (Cisco IOS)
15.3(3)JA1n (Cisco IOS)
15.5(3)SN0a (Cisco IOS)
15.3(3)JNP (Cisco IOS)
15.3(3)JNP1 (Cisco IOS)
15.3(3)JNP3 (Cisco IOS)
15.6(1)SN (Cisco IOS)
15.6(1)SN1 (Cisco IOS)
15.6(1)SN2 (Cisco IOS)
15.6(1)SN3 (Cisco IOS)
15.6(3)SN (Cisco IOS)
15.6(4)SN (Cisco IOS)
15.6(5)SN (Cisco IOS)
15.6(6)SN (Cisco IOS)
15.6(7)SN (Cisco IOS)
15.3(3)JPB (Cisco IOS)
15.3(3)JPB1 (Cisco IOS)
15.3(3)JD (Cisco IOS)
15.3(3)JD2 (Cisco IOS)
15.3(3)JD3 (Cisco IOS)
15.3(3)JD4 (Cisco IOS)
15.3(3)JD5 (Cisco IOS)
15.3(3)JD6 (Cisco IOS)
15.3(3)JD7 (Cisco IOS)
15.3(3)JD9 (Cisco IOS)
15.3(3)JD11 (Cisco IOS)
15.3(3)JD12 (Cisco IOS)
15.3(3)JD13 (Cisco IOS)
15.3(3)JD14 (Cisco IOS)
15.6(3)M1a (Cisco IOS)
15.3(3)JPC (Cisco IOS)
15.3(3)JPC1 (Cisco IOS)
15.3(3)JPC2 (Cisco IOS)
15.3(3)JPC3 (Cisco IOS)
15.3(3)JPC5 (Cisco IOS)
15.3(3)JE (Cisco IOS)
15.3(3)JPD (Cisco IOS)
15.3(3)JF (Cisco IOS)
15.3(3)JF1 (Cisco IOS)
15.3(3)JF4 (Cisco IOS)
15.3(3)JF5 (Cisco IOS)
15.3(3)JG (Cisco IOS)
15.3(3)JG1 (Cisco IOS)
15.3(3)JH (Cisco IOS)
15.1(3)SVO3 (Cisco IOS)
15.1(3)SVO4 (Cisco IOS)
15.1(3)SVK4c (Cisco IOS)
15.3(3)JI (Cisco IOS)
15.5(3)M2a (Cisco IOS)
15.6(2)T0a (Cisco IOS)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

-

Уровень опасности уязвимости

Высокий уровень опасности (базовая оценка CVSS 2.0 составляет 7,8)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,5)

Возможные меры по устранению уязвимости

Иcпользование рекомендаций:
https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-71139

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Существует

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 84%
0.02348
Низкий

7.5 High

CVSS3

7.8 High

CVSS2

Связанные уязвимости

CVSS3: 7.5
nvd
почти 7 лет назад

A vulnerability in the Network-Based Application Recognition (NBAR) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to a parsing issue on DNS packets. An attacker could exploit these vulnerabilities by sending crafted DNS packets through routers that are running an affected version and have NBAR enabled. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

CVSS3: 7.5
github
больше 3 лет назад

A vulnerability in the Network-Based Application Recognition (NBAR) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to a parsing issue on DNS packets. An attacker could exploit these vulnerabilities by sending crafted DNS packets through routers that are running an affected version and have NBAR enabled. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

EPSS

Процентиль: 84%
0.02348
Низкий

7.5 High

CVSS3

7.8 High

CVSS2