// For flags

CVE-2019-1909

Cisco IOS XR Software Border Gateway Protocol Denial of Service Vulnerability

Severity Score

5.9
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the implementation of Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to incorrect processing of certain BGP update messages. An attacker could exploit this vulnerability by sending BGP update messages that include a specific set of attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic from explicitly defined peers only. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.

Una vulnerabilidad en la implementación de la funcionalidad Border Gateway Protocol (BGP) en el software IOS XR de Cisco, podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un sistema afectado. La vulnerabilidad es debido al procesamiento incorrecto de ciertos mensajes de actualización de BGP. Un atacante podría explotar esta vulnerabilidad mediante el envío mensajes de actualización de BGP que incluyan un conjunto específico de atributos para ser procesados ??por un sistema afectado. Una operación con éxito podría permitir que el atacante cause que el proceso BGP se reinicie inesperadamente, resultando en una condición de DoS. La implementación de BGP de Cisco acepta el tráfico BGP entrante solamente de peers explícitamente definidos. Para aprovechar esta vulnerabilidad, el mensaje malicioso de actualización de BGP debería provenir de un peer BGP configurado y válido o el atacante necesitaría inyectarlo hacia la red de BGP de la víctima en una conexión TCP válida existente a un peer de BGP.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2018-12-06 CVE Reserved
  • 2019-07-06 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
>= 4.3.1 < 6.6.2
Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 9001
Search vendor "Cisco" for product "Asr 9001"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
>= 4.3.1 < 6.6.2
Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 9006
Search vendor "Cisco" for product "Asr 9006"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
>= 4.3.1 < 6.6.2
Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 9010
Search vendor "Cisco" for product "Asr 9010"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
>= 4.3.1 < 6.6.2
Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 9901
Search vendor "Cisco" for product "Asr 9901"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
>= 4.3.1 < 6.6.2
Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 9904
Search vendor "Cisco" for product "Asr 9904"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
>= 4.3.1 < 6.6.2
Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 9906
Search vendor "Cisco" for product "Asr 9906"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
>= 4.3.1 < 6.6.2
Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 9910
Search vendor "Cisco" for product "Asr 9910"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
>= 4.3.1 < 6.6.2
Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 9912
Search vendor "Cisco" for product "Asr 9912"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
>= 4.3.1 < 6.6.2
Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 9920
Search vendor "Cisco" for product "Asr 9920"
--
Safe