// For flags

CVE-2019-12664

Cisco IOS XE Software ISDN Data Leak Vulnerability

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Track
*SSVC
Descriptions

A vulnerability in the Dialer interface feature for ISDN connections in Cisco IOS XE Software for Cisco 4000 Series Integrated Services Routers (ISRs) could allow an unauthenticated, adjacent attacker to pass IPv4 traffic through an ISDN channel prior to successful PPP authentication. The vulnerability is due to insufficient validation of the state of the PPP IP Control Protocol (IPCP). An attacker could exploit this vulnerability by making an ISDN call to an affected device and sending traffic through the ISDN channel prior to successful PPP authentication. Alternatively, an unauthenticated, remote attacker could exploit this vulnerability by sending traffic through an affected device that is configured to exit via an ISDN connection for which both the Dialer interface and the Basic Rate Interface (BRI) have been configured, but the Challenge Handshake Authentication Protocol (CHAP) password for PPP does not match the remote end. A successful exploit could allow the attacker to pass IPv4 traffic through an unauthenticated ISDN connection for a few seconds, from initial ISDN call setup until PPP authentication fails.

Una vulnerabilidad en la funcionalidad Dialer interface para conexiones ISDN en el Software Cisco IOS XE para Cisco 4000 Series Integrated Services Routers (ISRs), podría permitir a un atacante adyacente no autenticado pasar el tráfico IPv4 por medio de un canal ISDN antes de una autenticación PPP con éxito. La vulnerabilidad es debido a una comprobación insuficiente del estado del Protocolo de Control IP PPP (IPCP). Un atacante podría explotar esta vulnerabilidad al hacer una llamada ISDN hacia un dispositivo afectado y enviando tráfico por medio del canal ISDN antes de una autenticación PPP con éxito. Alternativamente, un atacante remoto no autenticado podría explotar esta vulnerabilidad mediante el envío de tráfico a través de un dispositivo afectado que está configurado para salir por medio de una conexión RDSI para la que se han configurado tanto la Dialer interface como la Basic Rate Interface (BRI), pero la contraseña de Challenge Handshake Authentication Protocol (CHAP) para PPP no coincide con el extremo remoto. Una explotación con éxito podría permitir al atacante pasar el tráfico IPv4 por medio de una conexión ISDN no autenticada durante unos segundos, desde la configuración inicial de la llamada ISDN hasta el fallo de la autenticación PPP.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
High
Availability
None
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Track
Exploitation
None
Automatable
No
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2019-06-04 CVE Reserved
  • 2019-09-25 CVE Published
  • 2023-07-08 EPSS Updated
  • 2024-11-21 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-287: Improper Authentication
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.6.4
Search vendor "Cisco" for product "Ios Xe" and version "16.6.4"
-
Affected
in Cisco
Search vendor "Cisco"
4321 Integrated Services Router
Search vendor "Cisco" for product "4321 Integrated Services Router"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.6.4
Search vendor "Cisco" for product "Ios Xe" and version "16.6.4"
-
Affected
in Cisco
Search vendor "Cisco"
4331 Integrated Services Router
Search vendor "Cisco" for product "4331 Integrated Services Router"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.6.4
Search vendor "Cisco" for product "Ios Xe" and version "16.6.4"
-
Affected
in Cisco
Search vendor "Cisco"
4351 Integrated Services Router
Search vendor "Cisco" for product "4351 Integrated Services Router"
--
Safe