Lucene search

K
cve[email protected]CVE-2019-1749
HistoryMar 28, 2019 - 12:29 a.m.

CVE-2019-1749

2019-03-2800:29:00
CWE-20
web.nvd.nist.gov
50
cisco
ios xe
asr 900
rsp3
vulnerability
dos
nvd
cve-2019-1749

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

29.0%

A vulnerability in the ingress traffic validation of Cisco IOS XE Software for Cisco Aggregation Services Router (ASR) 900 Route Switch Processor 3 (RSP3) could allow an unauthenticated, adjacent attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability exists because the software insufficiently validates ingress traffic on the ASIC used on the RSP3 platform. An attacker could exploit this vulnerability by sending a malformed OSPF version 2 (OSPFv2) message to an affected device. A successful exploit could allow the attacker to cause a reload of the iosd process, triggering a reload of the affected device and resulting in a DoS condition.

Affected configurations

NVD
Node
ciscoios_xeMatch3.13.6as
OR
ciscoios_xeMatch3.16.0as
OR
ciscoios_xeMatch3.16.1as
OR
ciscoios_xeMatch3.16.2as
OR
ciscoios_xeMatch3.16.3as
OR
ciscoios_xeMatch3.16.4bs
OR
ciscoios_xeMatch3.16.4cs
OR
ciscoios_xeMatch3.16.4ds
OR
ciscoios_xeMatch3.16.4es
OR
ciscoios_xeMatch3.16.4gs
OR
ciscoios_xeMatch3.16.4s
OR
ciscoios_xeMatch3.16.5as
OR
ciscoios_xeMatch3.16.5s
OR
ciscoios_xeMatch3.16.6bs
OR
ciscoios_xeMatch3.16.6s
OR
ciscoios_xeMatch3.16.7bs
OR
ciscoios_xeMatch3.16.7s
OR
ciscoios_xeMatch3.16.8s
OR
ciscoios_xeMatch3.17.0s
OR
ciscoios_xeMatch3.17.1s
OR
ciscoios_xeMatch3.17.3s
OR
ciscoios_xeMatch3.17.4s
OR
ciscoios_xeMatch3.18.0s
OR
ciscoios_xeMatch3.18.0sp
OR
ciscoios_xeMatch3.18.1bsp
OR
ciscoios_xeMatch3.18.1gsp
OR
ciscoios_xeMatch3.18.1hsp
OR
ciscoios_xeMatch3.18.1isp
OR
ciscoios_xeMatch3.18.1s
OR
ciscoios_xeMatch3.18.1sp
OR
ciscoios_xeMatch3.18.2s
OR
ciscoios_xeMatch3.18.2sp
OR
ciscoios_xeMatch3.18.3s
OR
ciscoios_xeMatch3.18.3sp
OR
ciscoios_xeMatch3.18.4s
OR
ciscoios_xeMatch3.18.4sp
OR
ciscoios_xeMatch16.5.1
OR
ciscoios_xeMatch16.5.2
OR
ciscoios_xeMatch16.5.3
OR
ciscoios_xeMatch16.6.1
OR
ciscoios_xeMatch16.6.2
OR
ciscoios_xeMatch16.6.3
OR
ciscoios_xeMatch16.6.4
OR
ciscoios_xeMatch16.7.1
OR
ciscoios_xeMatch16.7.2
OR
ciscoios_xeMatch16.8.1
OR
ciscoios_xeMatch16.8.1b
OR
ciscoios_xeMatch16.8.1c

CNA Affected

[
  {
    "product": "Cisco IOS XE Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "3.13.6aS"
      },
      {
        "status": "affected",
        "version": "3.16.0aS"
      },
      {
        "status": "affected",
        "version": "3.16.1aS"
      },
      {
        "status": "affected",
        "version": "3.16.2aS"
      },
      {
        "status": "affected",
        "version": "3.16.3aS"
      },
      {
        "status": "affected",
        "version": "3.16.4S"
      },
      {
        "status": "affected",
        "version": "3.16.4bS"
      },
      {
        "status": "affected",
        "version": "3.16.4gS"
      },
      {
        "status": "affected",
        "version": "3.16.5S"
      },
      {
        "status": "affected",
        "version": "3.16.4cS"
      },
      {
        "status": "affected",
        "version": "3.16.4dS"
      },
      {
        "status": "affected",
        "version": "3.16.4eS"
      },
      {
        "status": "affected",
        "version": "3.16.6S"
      },
      {
        "status": "affected",
        "version": "3.16.5aS"
      },
      {
        "status": "affected",
        "version": "3.16.7S"
      },
      {
        "status": "affected",
        "version": "3.16.6bS"
      },
      {
        "status": "affected",
        "version": "3.16.7bS"
      },
      {
        "status": "affected",
        "version": "3.16.8S"
      },
      {
        "status": "affected",
        "version": "3.17.0S"
      },
      {
        "status": "affected",
        "version": "3.17.1S"
      },
      {
        "status": "affected",
        "version": "3.17.2S"
      },
      {
        "status": "affected",
        "version": "3.17.3S"
      },
      {
        "status": "affected",
        "version": "3.17.4S"
      },
      {
        "status": "affected",
        "version": "16.5.1"
      },
      {
        "status": "affected",
        "version": "16.5.2"
      },
      {
        "status": "affected",
        "version": "16.5.3"
      },
      {
        "status": "affected",
        "version": "3.18.0S"
      },
      {
        "status": "affected",
        "version": "3.18.1S"
      },
      {
        "status": "affected",
        "version": "3.18.2S"
      },
      {
        "status": "affected",
        "version": "3.18.3S"
      },
      {
        "status": "affected",
        "version": "3.18.4S"
      },
      {
        "status": "affected",
        "version": "3.18.0SP"
      },
      {
        "status": "affected",
        "version": "3.18.1SP"
      },
      {
        "status": "affected",
        "version": "3.18.1gSP"
      },
      {
        "status": "affected",
        "version": "3.18.1bSP"
      },
      {
        "status": "affected",
        "version": "3.18.2SP"
      },
      {
        "status": "affected",
        "version": "3.18.1hSP"
      },
      {
        "status": "affected",
        "version": "3.18.1iSP"
      },
      {
        "status": "affected",
        "version": "3.18.3SP"
      },
      {
        "status": "affected",
        "version": "3.18.4SP"
      },
      {
        "status": "affected",
        "version": "16.6.1"
      },
      {
        "status": "affected",
        "version": "16.6.2"
      },
      {
        "status": "affected",
        "version": "16.6.3"
      },
      {
        "status": "affected",
        "version": "16.6.4"
      },
      {
        "status": "affected",
        "version": "16.7.1"
      },
      {
        "status": "affected",
        "version": "16.7.2"
      },
      {
        "status": "affected",
        "version": "16.8.1"
      },
      {
        "status": "affected",
        "version": "16.8.1b"
      },
      {
        "status": "affected",
        "version": "16.8.1c"
      }
    ]
  }
]

6.1 Medium

CVSS2

Attack Vector

ADJACENT_NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:A/AC:L/Au:N/C:N/I:N/A:C

7.4 High

CVSS3

Attack Vector

ADJACENT

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

0.001 Low

EPSS

Percentile

29.0%

Related for CVE-2019-1749