Lucene search

K
cveCiscoCVE-2019-16023
HistorySep 23, 2020 - 1:15 a.m.

CVE-2019-16023

2020-09-2301:15:14
CWE-399
cisco
web.nvd.nist.gov
40
cisco
ios xr
bgp
evpn
vulnerability
dos
remote attacker
nvd

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.6

Confidence

High

EPSS

0.002

Percentile

52.6%

Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerabilities are due to incorrect processing of BGP update messages that contain crafted EVPN attributes. An attacker could exploit these vulnerabilities by sending BGP EVPN update messages with malformed attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit these vulnerabilities, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim’s BGP network on an existing, valid TCP connection to a BGP peer.

Affected configurations

Nvd
Node
ciscoios_xrMatch6.6.1
AND
ciscoasr_9000Match-x64
OR
ciscoasr_9010Match-x64
OR
ciscoasr_9904Match-x64
OR
ciscoasr_9910Match-x64
OR
ciscoasr_9912Match-x64
OR
ciscoasr_9922Match-x64
OR
cisconcs_540Match-
OR
cisconcs_5500Match-
OR
cisconcs_6000Match-
Node
ciscoios_xrMatch6.6.2
AND
ciscoasr_9000Match--
OR
ciscoasr_9000Match-x64
OR
ciscoasr_9010Match--
OR
ciscoasr_9010Match-x64
OR
ciscoasr_9904Match--
OR
ciscoasr_9904Match-x64
OR
ciscoasr_9910Match--
OR
ciscoasr_9910Match-x64
OR
ciscoasr_9912Match--
OR
ciscoasr_9912Match-x64
OR
ciscoasr_9922Match--
OR
ciscoasr_9922Match-x64
OR
ciscocarrier_routing_systemMatch-
OR
ciscoios_xrv_9000Match-
OR
cisconcs_5001Match-
OR
cisconcs_5002Match-
OR
cisconcs_5011Match-
OR
cisconcs_540Match-
OR
cisconcs_5500Match-
OR
cisconcs_6000Match-
Node
ciscoios_xrMatch6.6.25
AND
cisconcs_540Match-
OR
cisconcs_540lMatch-
OR
cisconcs_5500Match-
OR
cisconcs_560Match-
Node
ciscoios_xrMatch7.0.1
AND
ciscoasr_9000Match-x64
OR
ciscoasr_9010Match-x64
OR
ciscoasr_9904Match-x64
OR
ciscoasr_9910Match-x64
OR
ciscoasr_9912Match-x64
OR
ciscoasr_9922Match-x64
OR
ciscoios_xrv_9000Match-
OR
cisconcs_1001Match-
OR
cisconcs_1002Match-
OR
cisconcs_1004Match-
OR
cisconcs_5001Match-
OR
cisconcs_5002Match-
OR
cisconcs_5011Match-
OR
cisconcs_540Match-
OR
cisconcs_540lMatch-
OR
cisconcs_5500Match-
OR
cisconcs_560Match-
OR
cisconcs_6000Match-
VendorProductVersionCPE
ciscoios_xr6.6.1cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*
ciscoasr_9000-cpe:2.3:h:cisco:asr_9000:-:*:*:*:*:*:x64:*
ciscoasr_9010-cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:x64:*
ciscoasr_9904-cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:x64:*
ciscoasr_9910-cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:x64:*
ciscoasr_9912-cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:x64:*
ciscoasr_9922-cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:x64:*
cisconcs_540-cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*
cisconcs_5500-cpe:2.3:h:cisco:ncs_5500:-:*:*:*:*:*:*:*
cisconcs_6000-cpe:2.3:h:cisco:ncs_6000:-:*:*:*:*:*:*:*
Rows per page:
1-10 of 291

CNA Affected

[
  {
    "product": "Cisco IOS XR Software",
    "vendor": "Cisco",
    "versions": [
      {
        "status": "affected",
        "version": "n/a"
      }
    ]
  }
]

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

AI Score

7.6

Confidence

High

EPSS

0.002

Percentile

52.6%

Related for CVE-2019-16023