Lucene search

K
ciscoCiscoCISCO-SA-IOSXR-XML-TCPDOS-ZEXVRU2S
HistorySep 11, 2024 - 4:00 p.m.

Cisco IOS XR Software Dedicated XML Agent TCP Denial of Service Vulnerability

2024-09-1116:00:00
tools.cisco.com
cisco
ios xr
software
dedicated xml agent
tcp
denial of service
vulnerability

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.6%

A vulnerability in the Dedicated XML Agent feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on XML TCP listen port 38751.

This vulnerability is due to a lack of proper error validation of ingress XML packets. An attacker could exploit this vulnerability by sending a sustained, crafted stream of XML traffic to a targeted device. A successful exploit could allow the attacker to cause XML TCP port 38751 to become unreachable while the attack traffic persists.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S”]

This advisory is part of the September 2024 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2024 Semiannual Cisco IOS XR Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-75416”].

Affected configurations

Vulners
Node
ciscoios_xr_softwareMatchany
OR
ciscoios_xr_softwareMatchany
VendorProductVersionCPE
ciscoios_xr_softwareanycpe:2.3:o:cisco:ios_xr_software:any:*:*:*:*:*:*:*

AI Score

7.1

Confidence

High

EPSS

0

Percentile

9.6%

Related for CISCO-SA-IOSXR-XML-TCPDOS-ZEXVRU2S