Lucene search

K
cve[email protected]CVE-2019-16021
HistorySep 23, 2020 - 1:15 a.m.

CVE-2019-16021

2020-09-2301:15:13
CWE-399
web.nvd.nist.gov
56
cisco
ios xr
software
vulnerabilities
remote
dos
bgp
evpn
cve-2019-16021

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.7%

Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerabilities are due to incorrect processing of BGP update messages that contain crafted EVPN attributes. An attacker could exploit these vulnerabilities by sending BGP EVPN update messages with malformed attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit these vulnerabilities, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim’s BGP network on an existing, valid TCP connection to a BGP peer.

Affected configurations

NVD
Node
ciscoios_xrMatch6.6.1
AND
ciscoasr_9000Match-x64
OR
ciscoasr_9010Match-x64
OR
ciscoasr_9904Match-x64
OR
ciscoasr_9910Match-x64
OR
ciscoasr_9912Match-x64
OR
ciscoasr_9922Match-x64
OR
cisconcs_540Match-
OR
cisconcs_5500Match-
OR
cisconcs_6000Match-
Node
ciscoios_xrMatch6.6.2
AND
ciscoasr_9000Match--
OR
ciscoasr_9000Match-x64
OR
ciscoasr_9010Match--
OR
ciscoasr_9010Match-x64
OR
ciscoasr_9904Match--
OR
ciscoasr_9904Match-x64
OR
ciscoasr_9910Match--
OR
ciscoasr_9910Match-x64
OR
ciscoasr_9912Match--
OR
ciscoasr_9912Match-x64
OR
ciscoasr_9922Match--
OR
ciscoasr_9922Match-x64
OR
ciscocarrier_routing_systemMatch-
OR
ciscoios_xrv_9000Match-
OR
cisconcs_5001Match-
OR
cisconcs_5002Match-
OR
cisconcs_5011Match-
OR
cisconcs_540Match-
OR
cisconcs_5500Match-
OR
cisconcs_6000Match-
Node
ciscoios_xrMatch6.6.25
AND
cisconcs_540Match-
OR
cisconcs_540lMatch-
OR
cisconcs_5500Match-
OR
cisconcs_560Match-
Node
ciscoios_xrMatch7.0.1
AND
ciscoasr_9000Match-x64
OR
ciscoasr_9010Match-x64
OR
ciscoasr_9904Match-x64
OR
ciscoasr_9910Match-x64
OR
ciscoasr_9912Match-x64
OR
ciscoasr_9922Match-x64
OR
ciscoios_xrv_9000Match-
OR
cisconcs_1001Match-
OR
cisconcs_1002Match-
OR
cisconcs_1004Match-
OR
cisconcs_5001Match-
OR
cisconcs_5002Match-
OR
cisconcs_5011Match-
OR
cisconcs_540Match-
OR
cisconcs_540lMatch-
OR
cisconcs_5500Match-
OR
cisconcs_560Match-
OR
cisconcs_6000Match-
CPENameOperatorVersion
cisco:ios_xrcisco ios xreq6.6.1

CNA Affected

[
  {
    "product": "Cisco IOS XR Software ",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

5 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

7.6 High

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

52.7%

Related for CVE-2019-16021