CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:N/AC:L/Au:N/C:N/I:N/A:C
EPSS
Percentile
65.8%
A vulnerability in the TCP module of multiple Cisco products could allow an unauthenticated, remote attacker to disable TCP ports and cause an increase in CPU and memory usage, resulting in a denial of service (DoS) condition.
The vulnerability is due to a lack of rate limiting in the TCP listener application. An attacker could exploit this vulnerability by sending a TCP SYN flood or DoS traffic stream to a targeted device. An exploit could allow the attacker to block TCP listening ports and exhaust system resources such as CPU and memory.
Cisco has confirmed the vulnerability; however, software updates are not available.
To exploit this vulnerability, an attacker may need access to trusted, internal networks to send a TCP SYN flood or DoS traffic stream to the affected device. This access requirement may reduce the likelihood of a successful exploit.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | dta_control_system | any | cpe:2.3:o:cisco:dta_control_system:any:*:*:*:*:*:*:* |
cisco | headend_system_release | any | cpe:2.3:o:cisco:headend_system_release:any:*:*:*:*:*:*:* |