CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
PARTIAL
AV:N/AC:L/Au:N/C:N/I:N/A:P
EPSS
Percentile
65.8%
A vulnerability in the TCP packet input handler of the Cisco Gateway GPRS Support Node (GGSN) could allow an unauthenticated, remote attacker to cause a reset of the Session Manager application.
The vulnerability is due to improper input validation of the length fields of the TCP/IP header. An attacker could exploit this vulnerability by sending a crafted TCP packet with an invalid TCP/IP header. A successful exploit could allow the attacker to cause the Session Manager application on an affected device to restart, resulting in a DoS condition.
Cisco has confirmed the vulnerability and released software updates.
To exploit this vulnerability, the attacker must send a crafted TCP packet with an invalid TCP/IP header to the targeted system, making exploitation more difficult in environments that restrict network access from untrusted sources.
Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | asr_5000_series_software | any | cpe:2.3:a:cisco:asr_5000_series_software:any:*:*:*:*:*:*:* |
cisco | asr_9904 | 5000_series_software | cpe:2.3:h:cisco:asr_9904:5000_series_software:*:*:*:*:*:*:* |