Lucene search

K
ciscoCiscoCISCO-SA-20190327-RSP3-OSPF
HistoryMar 27, 2019 - 4:00 p.m.

Cisco Aggregation Services Router 900 Route Switch Processor 3 OSPFv2 Denial of Service Vulnerability

2019-03-2716:00:00
tools.cisco.com
31

0.001 Low

EPSS

Percentile

29.0%

A vulnerability in the ingress traffic validation of Cisco IOS XE Software for Cisco Aggregation Services Router (ASR) 900 Route Switch Processor 3 (RSP3) could allow an unauthenticated, adjacent attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition.

The vulnerability exists because the software insufficiently validates ingress traffic on the ASIC used on the RSP3 platform. An attacker could exploit this vulnerability by sending a malformed OSPF version 2 (OSPFv2) message to an affected device. A successful exploit could allow the attacker to cause a reload of the iosd process, triggering a reload of the affected device and resulting in a DoS condition.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-rsp3-ospf [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-rsp3-ospf”]

This advisory is part of the March 27, 2019, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 19 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-71135”].

Affected configurations

Vulners
Node
ciscocisco_iosMatch3.13sxe
OR
ciscocisco_iosMatch3.16sxe
OR
ciscocisco_iosMatch3.17sxe
OR
ciscocisco_iosMatch16.5xe
OR
ciscocisco_iosMatch3.18sxe
OR
ciscocisco_iosMatch3.18spxe
OR
ciscocisco_iosMatch16.6xe
OR
ciscocisco_iosMatch16.7xe
OR
ciscocisco_iosMatch16.8xe
OR
ciscocisco_iosMatch3.13.6asxe
OR
ciscocisco_iosMatch3.16.0asxe
OR
ciscocisco_iosMatch3.16.1asxe
OR
ciscocisco_iosMatch3.16.2asxe
OR
ciscocisco_iosMatch3.16.3asxe
OR
ciscocisco_iosMatch3.16.4sxe
OR
ciscocisco_iosMatch3.16.4bsxe
OR
ciscocisco_iosMatch3.16.4gsxe
OR
ciscocisco_iosMatch3.16.5sxe
OR
ciscocisco_iosMatch3.16.4csxe
OR
ciscocisco_iosMatch3.16.4dsxe
OR
ciscocisco_iosMatch3.16.4esxe
OR
ciscocisco_iosMatch3.16.6sxe
OR
ciscocisco_iosMatch3.16.5asxe
OR
ciscocisco_iosMatch3.16.7sxe
OR
ciscocisco_iosMatch3.16.6bsxe
OR
ciscocisco_iosMatch3.16.7bsxe
OR
ciscocisco_iosMatch3.16.8sxe
OR
ciscocisco_iosMatch3.17.0sxe
OR
ciscocisco_iosMatch3.17.1sxe
OR
ciscocisco_iosMatch3.17.2sxe
OR
ciscocisco_iosMatch3.17.3sxe
OR
ciscocisco_iosMatch3.17.4sxe
OR
ciscocisco_iosMatch16.5.1xe
OR
ciscocisco_iosMatch16.5.2xe
OR
ciscocisco_iosMatch16.5.3xe
OR
ciscocisco_iosMatch3.18.0sxe
OR
ciscocisco_iosMatch3.18.1sxe
OR
ciscocisco_iosMatch3.18.2sxe
OR
ciscocisco_iosMatch3.18.3sxe
OR
ciscocisco_iosMatch3.18.4sxe
OR
ciscocisco_iosMatch3.18.0spxe
OR
ciscocisco_iosMatch3.18.1spxe
OR
ciscocisco_iosMatch3.18.1gspxe
OR
ciscocisco_iosMatch3.18.1bspxe
OR
ciscocisco_iosMatch3.18.2spxe
OR
ciscocisco_iosMatch3.18.1hspxe
OR
ciscocisco_iosMatch3.18.1ispxe
OR
ciscocisco_iosMatch3.18.3spxe
OR
ciscocisco_iosMatch3.18.4spxe
OR
ciscocisco_iosMatch16.6.1xe
OR
ciscocisco_iosMatch16.6.2xe
OR
ciscocisco_iosMatch16.6.3xe
OR
ciscocisco_iosMatch16.6.4xe
OR
ciscocisco_iosMatch16.7.1xe
OR
ciscocisco_iosMatch16.7.2xe
OR
ciscocisco_iosMatch16.8.1xe
OR
ciscocisco_iosMatch16.8.1bxe
OR
ciscocisco_iosMatch16.8.1cxe

0.001 Low

EPSS

Percentile

29.0%

Related for CISCO-SA-20190327-RSP3-OSPF