Lucene search

K
ciscoCiscoCISCO-SA-20190417-IOSXRACL
HistoryApr 17, 2019 - 4:00 p.m.

Cisco ASR 9000 Series Aggregation Services Routers ACL Bypass Vulnerability

2019-04-1716:00:00
tools.cisco.com
27

0.001 Low

EPSS

Percentile

50.2%

A vulnerability in the TCP flags inspection feature for access control lists (ACLs) on Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, remote attacker to bypass protection offered by a configured ACL on an affected device.

The vulnerability is due to incorrect processing of the ACL applied to an interface of an affected device when Cisco Express Forwarding load balancing using the 3-tuple hash algorithm is enabled. An attacker could exploit this vulnerability by sending traffic through an affected device that should otherwise be denied by the configured ACL. An exploit could allow the attacker to bypass protection offered by a configured ACL on the affected device.

There are workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-iosxracl [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190417-iosxracl”]

Affected configurations

Vulners
Node
ciscoios_xr_softwareMatchany
OR
ciscoasr_900_series_softwareMatchany
OR
ciscoios_xr_softwareMatchany
OR
ciscoasr_900_series_softwareMatch9000_series_aggregation_services_routers

0.001 Low

EPSS

Percentile

50.2%

Related for CISCO-SA-20190417-IOSXRACL