CVE-2019-1909
Cisco IOS XR Software Border Gateway Protocol Denial of Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the implementation of Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected system. The vulnerability is due to incorrect processing of certain BGP update messages. An attacker could exploit this vulnerability by sending BGP update messages that include a specific set of attributes to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic from explicitly defined peers only. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.
Una vulnerabilidad en la implementación de la funcionalidad Border Gateway Protocol (BGP) en el software IOS XR de Cisco, podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en un sistema afectado. La vulnerabilidad es debido al procesamiento incorrecto de ciertos mensajes de actualización de BGP. Un atacante podría explotar esta vulnerabilidad mediante el envío mensajes de actualización de BGP que incluyan un conjunto específico de atributos para ser procesados ??por un sistema afectado. Una operación con éxito podría permitir que el atacante cause que el proceso BGP se reinicie inesperadamente, resultando en una condición de DoS. La implementación de BGP de Cisco acepta el tráfico BGP entrante solamente de peers explícitamente definidos. Para aprovechar esta vulnerabilidad, el mensaje malicioso de actualización de BGP debería provenir de un peer BGP configurado y válido o el atacante necesitaría inyectarlo hacia la red de BGP de la víctima en una conexión TCP válida existente a un peer de BGP.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2018-12-06 CVE Reserved
- 2019-07-06 CVE Published
- 2023-03-07 EPSS Updated
- 2024-11-21 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Xr Search vendor "Cisco" for product "Ios Xr" | >= 4.3.1 < 6.6.2 Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asr 9001 Search vendor "Cisco" for product "Asr 9001" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xr Search vendor "Cisco" for product "Ios Xr" | >= 4.3.1 < 6.6.2 Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asr 9006 Search vendor "Cisco" for product "Asr 9006" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xr Search vendor "Cisco" for product "Ios Xr" | >= 4.3.1 < 6.6.2 Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asr 9010 Search vendor "Cisco" for product "Asr 9010" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xr Search vendor "Cisco" for product "Ios Xr" | >= 4.3.1 < 6.6.2 Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asr 9901 Search vendor "Cisco" for product "Asr 9901" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xr Search vendor "Cisco" for product "Ios Xr" | >= 4.3.1 < 6.6.2 Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asr 9904 Search vendor "Cisco" for product "Asr 9904" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xr Search vendor "Cisco" for product "Ios Xr" | >= 4.3.1 < 6.6.2 Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asr 9906 Search vendor "Cisco" for product "Asr 9906" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xr Search vendor "Cisco" for product "Ios Xr" | >= 4.3.1 < 6.6.2 Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asr 9910 Search vendor "Cisco" for product "Asr 9910" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xr Search vendor "Cisco" for product "Ios Xr" | >= 4.3.1 < 6.6.2 Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asr 9912 Search vendor "Cisco" for product "Asr 9912" | - | - |
Safe
|
Cisco Search vendor "Cisco" | Ios Xr Search vendor "Cisco" for product "Ios Xr" | >= 4.3.1 < 6.6.2 Search vendor "Cisco" for product "Ios Xr" and version " >= 4.3.1 < 6.6.2" | - |
Affected
| in | Cisco Search vendor "Cisco" | Asr 9920 Search vendor "Cisco" for product "Asr 9920" | - | - |
Safe
|