Lucene search

K
ciscoCiscoCISCO-SA-20140520-CVE-2014-3270
HistoryMay 20, 2014 - 3:07 p.m.

Cisco IOS XR Software DHCP Version 6 Process Hang Vulnerability

2014-05-2015:07:36
tools.cisco.com
12

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.001

Percentile

48.6%

A vulnerability in the DHCP version 6 (DHCPv6) code of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a hang condition of the DHCPv6 server process that could cause the software to stop processing DHCPv6 requests.

The vulnerability is due to incorrect handling of malformed DHCPv6 packets. An attacker could exploit this vulnerability by sending a malformed DHCPv6 packet to an affected device configured with DHCPv6 server functionality. An exploit could allow the attacker to cause a hang condition of the DHCPv6 server process that could cause the software to stop processing any further DHCPv6 requests.

Cisco has confirmed the vulnerability in a security notice and released software updates.

To exploit this vulnerability, an attacker may need access to trusted, internal networks to send malformed DCHPv6 packets to a targeted device. In addition, the device must be configured with DCHPv6 server functionality. These requirements may reduce the possibility of a successful exploit.

Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Affected configurations

Vulners
Node
ciscoios_xr_softwareMatchany
OR
ciscoios_xr_softwareMatchany
VendorProductVersionCPE
ciscoios_xr_softwareanycpe:2.3:o:cisco:ios_xr_software:any:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

EPSS

0.001

Percentile

48.6%

Related for CISCO-SA-20140520-CVE-2014-3270