Lucene search

K
ciscoCiscoCISCO-SA-20170705-STAROS
HistoryJul 05, 2017 - 4:00 p.m.

Cisco StarOS Border Gateway Protocol Process Denial of Service Vulnerability

2017-07-0516:00:00
tools.cisco.com
18

EPSS

0.002

Percentile

61.9%

A vulnerability in the Border Gateway Protocol (BGP) processing functionality of the Cisco StarOS operating system for Cisco ASR 5000 Series Routers and Cisco Virtualized Packet Core (VPC) Software could allow an unauthenticated, remote attacker to cause the BGP process on an affected system to reload, resulting in a denial of service (DoS) condition.

The vulnerability is due to improper boundary controls for the BGP peering sessions list. An attacker could exploit this vulnerability by sending crafted TCP packets to an IPv4 or IPv6 interface on an affected system, if BGP is enabled for the system. By default, BGP is not enabled on the affected systems.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-staros [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170705-staros”]

Affected configurations

Vulners
Node
ciscoasr_5000_series_softwareMatchany
OR
ciscoasr_9904Match5000_series_software
VendorProductVersionCPE
ciscoasr_5000_series_softwareanycpe:2.3:a:cisco:asr_5000_series_software:any:*:*:*:*:*:*:*
ciscoasr_99045000_series_softwarecpe:2.3:h:cisco:asr_9904:5000_series_software:*:*:*:*:*:*:*

EPSS

0.002

Percentile

61.9%

Related for CISCO-SA-20170705-STAROS