Lucene search

K
ciscoCiscoCISCO-SA-CISCO-PDNG-DOS-KMZWEY2Q
HistoryApr 05, 2023 - 4:00 p.m.

Cisco Packet Data Network Gateway IPsec ICMP Denial of Service Vulnerability

2023-04-0516:00:00
tools.cisco.com
18
cisco
packet data network
vpp
ipsec
icmp
dos
vulnerability
software update
unauthenticated
remote attacker
malformed packet

0.001 Low

EPSS

Percentile

46.2%

A vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) could allow an unauthenticated, remote attacker to stop ICMP traffic from being processed over an IPsec connection.

This vulnerability is due to the VPP improperly handling a malformed packet. An attacker could exploit this vulnerability by sending a malformed Encapsulating Security Payload (ESP) packet over an IPsec connection. A successful exploit could allow the attacker to stop ICMP traffic over an IPsec connection and cause a denial of service (DoS).

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-pdng-dos-KmzwEy2Q [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cisco-pdng-dos-KmzwEy2Q”]

Affected configurations

Vulners
Node
ciscoasr_5000_series_softwareMatchany
OR
ciscoasr_9904Match5000_series_software

0.001 Low

EPSS

Percentile

46.2%

Related for CISCO-SA-CISCO-PDNG-DOS-KMZWEY2Q