Lucene search

K
ciscoCiscoCISCO-SA-20131202-CVE-2013-6706
HistoryDec 02, 2013 - 9:04 p.m.

Cisco IOS XE Software IP Header Sanity Check Denial of Service Vulnerability

2013-12-0221:04:44
tools.cisco.com
11

CVSS2

5.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:N/I:N/A:C

EPSS

0.01

Percentile

84.0%

A vulnerability in the Cisco Express Forwarding processing module that checks the sanity of IP headers on Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, leading to a denial of service (DoS) condition.

The vulnerability is due to improper processing of Multiprotocol Label Switching (MPLS) packets. When certain additional features are configured, an attacker could exploit this vulnerability by sending MPLS packets to traverse and exit an affected device as IP packets. An exploit could allow the attacker to cause the device to reload, leading to a DoS condition.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker may need access to trusted, internal networks; in which the targeted device may reside, in order to send MPLS packets. This access requirement may reduce the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscocisco_iosMatch3.9sxe
OR
ciscocisco_iosMatch3.9.1sxe
OR
ciscocisco_iosMatch3.9.0sxe

CVSS2

5.4

Attack Vector

NETWORK

Attack Complexity

HIGH

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:H/Au:N/C:N/I:N/A:C

EPSS

0.01

Percentile

84.0%

Related for CISCO-SA-20131202-CVE-2013-6706