Denial of service in Cisco Mobility Management Entity

Published: 2020-01-09
Risk Medium
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2019-16026
Exploitation vector Network
Public exploit N/A
Vulnerable software
Cisco Mobility Management Entity
Hardware solutions / Other hardware appliances

Vendor Cisco Systems, Inc

Security Bulletin

This security bulletin contains one medium risk vulnerability.

1) Input validation error

EUVDB-ID: #VU24158

Risk: Medium

CVSSv3.1: 5.9 [CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16026

CWE-ID: CWE-20 - Improper input validation

Exploit availability: No


The vulnerability allows a remote attacker to perform a denial of service (DoS) attack on an eNodeB that is connected to an affected device.

The vulnerability exists due to insufficient validation of user-supplied input in the implementation of the Stream Control Transmission Protocol (SCTP). A remote attacker can leverage a man-in-the-middle position between the eNodeB and the MME, then send a specially crafted SCTP message to the MME and cause the MME to stop sending SCTP messages to the eNodeB, results in denial of service condition.


Install updates from vendor's website.

Vulnerable software versions

Cisco Mobility Management Entity: before 21.16.1

External links

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.