Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

fstec логотип

BDU:2019-01969

Опубликовано: 15 мая 2019
Источник: fstec
CVSS3: 7.4
CVSS2: 6.1
EPSS Низкий

Описание

Уязвимость операционной системы Cisco IOS XR связана с ошибками исключительных состояний. Эксплуатация уязвимости может позволить нарушителю вызвать отказ в обслуживании в результате внедрения вредоносного трафика в целевую EVPN-сеть

Вендор

Cisco Systems Inc.

Наименование ПО

Cisco IOS XR

Версия ПО

6.1 (Cisco IOS XR)
6.1 (Cisco IOS XR)
6.2 (Cisco IOS XR)
6.2 (Cisco IOS XR)
6.3 (Cisco IOS XR)
6.3 (Cisco IOS XR)
6.4 (Cisco IOS XR)
6.4 (Cisco IOS XR)
6.5 (Cisco IOS XR)
6.5 (Cisco IOS XR)
6.6 (Cisco IOS XR)
6.6 (Cisco IOS XR)

Тип ПО

Операционная система

Операционные системы и аппаратные платформы

Cisco Systems Inc. Cisco IOS XR 6.1
Cisco Systems Inc. Cisco IOS XR 6.1
Cisco Systems Inc. Cisco IOS XR 6.2
Cisco Systems Inc. Cisco IOS XR 6.2
Cisco Systems Inc. Cisco IOS XR 6.3
Cisco Systems Inc. Cisco IOS XR 6.3
Cisco Systems Inc. Cisco IOS XR 6.4
Cisco Systems Inc. Cisco IOS XR 6.4
Cisco Systems Inc. Cisco IOS XR 6.5
Cisco Systems Inc. Cisco IOS XR 6.5
Cisco Systems Inc. Cisco IOS XR 6.6
Cisco Systems Inc. Cisco IOS XR 6.6

Уровень опасности уязвимости

Средний уровень опасности (базовая оценка CVSS 2.0 составляет 6,1)
Высокий уровень опасности (базовая оценка CVSS 3.0 составляет 7,4)

Возможные меры по устранению уязвимости

Использование рекомендаций:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-iosxr-evpn-dos

Статус уязвимости

Подтверждена производителем

Наличие эксплойта

Данные уточняются

Информация об устранении

Уязвимость устранена

Идентификаторы других систем описаний уязвимостей

EPSS

Процентиль: 32%
0.00128
Низкий

7.4 High

CVSS3

6.1 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.4
nvd
больше 6 лет назад

A vulnerability in the Border Gateway Patrol (BGP) Multiprotocol Label Switching (MPLS)-based Ethernet VPN (EVPN) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a logic error that occurs when the affected software processes specific EVPN routing information. An attacker could exploit this vulnerability by injecting malicious traffic patterns into the targeted EVPN network. A successful exploit could result in a crash of the l2vpn_mgr process on Provider Edge (PE) device members of the same EVPN instance (EVI). On each of the affected devices, a crash could lead to system instability and the inability to process or forward traffic through the device, resulting in a DoS condition that would require manual intervention to restore normal operating conditions.

CVSS3: 6.5
github
больше 3 лет назад

A vulnerability in the Border Gateway Patrol (BGP) Multiprotocol Label Switching (MPLS)-based Ethernet VPN (EVPN) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a logic error that occurs when the affected software processes specific EVPN routing information. An attacker could exploit this vulnerability by injecting malicious traffic patterns into the targeted EVPN network. A successful exploit could result in a crash of the l2vpn_mgr process on Provider Edge (PE) device members of the same EVPN instance (EVI). On each of the affected devices, a crash could lead to system instability and the inability to process or forward traffic through the device, resulting in a DoS condition that would require manual intervention to restore normal operating conditions.

EPSS

Процентиль: 32%
0.00128
Низкий

7.4 High

CVSS3

6.1 Medium

CVSS2