Cisco IOS XE Software denial of service | CVE-2022-20870
NAME
Cisco IOS XE Software denial of service
- Platforms Affected:
Cisco IOS XE Software
Cisco Catalyst 3650 Series Switches
Cisco Catalyst 3850 Series Switches
Cisco Catalyst 9300 Series Switches
Cisco Catalyst 9500 Series Switches
Cisco Catalyst 9400 Series Switches
Cisco Catalyst 9600 Series Switches - Risk Level:
8.6 - Exploitability:
Unproven - Consequences:
Denial of Service
DESCRIPTION
Cisco IOS XE Software is vulnerable to a denial of service, caused by insufficient input validation of IPv4 traffic in the egress MPLS packet processing function. By sending a specially crafted packet out of an affected MPLS-enabled interface, a remote attacker could exploit this vulnerability to cause the device to reload.
CVSS 3.0 Information
- Privileges Required: None
- User Interaction: None
- Scope: Changed
- Access Vector: Network
- Access Complexity: Low
- Confidentiality Impact: None
- Integrity Impact: None
- Availability Impact: High
- Remediation Level: Official Fix
MITIGATION
Refer to Cisco Security Advisory cisco-sa-iosxe-mpls-dos-Ab4OUL3 for patch, upgrade or suggested workaround information. See References.
- Reference Link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-mpls-dos-Ab4OUL3 - Reference Link:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-20870
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on Patreon using the button below
To keep up to date follow us on the below channels.