Lucene search

K
ciscoCiscoCISCO-SA-20131217-CVE-2013-6701
HistoryDec 17, 2013 - 6:37 p.m.

Cisco ONS 15454 Transport Node Controller Denial of Service Vulnerability

2013-12-1718:37:12
tools.cisco.com
12

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

72.1%

An issue in the tNetTaskLimit process of the Cisco ONS 15454 Transport Node Controller (TNC) could allow an unauthenticated, remote attacker to cause the TNC to reload due to a watchdog timeout.

The issue is due to a packet processing services process missing health pings due to excessive traffic sent to the TNC during stability security testing and the TNC reset due to a watchdog timeout. An attacker could exploit this issue by sending high rates of data traffic to the TNC. An exploit could allow the attacker to trigger a reload of the TNC.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, it is likely that an attacker would need access to trusted, internal networks where the targeted device resides to send high rates of data traffic to the device. This access requirement may reduce the likelihood of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscocisco_ons_15454_system_softwareMatchany
OR
ciscoonsMatch15454_system_software

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

0.004 Low

EPSS

Percentile

72.1%

Related for CISCO-SA-20131217-CVE-2013-6701