Risk | High |
Patch available | NO |
Number of vulnerabilities | 7 |
CVE-ID | CVE-2019-15989 CVE-2019-16023 CVE-2019-16022 CVE-2019-16021 CVE-2019-16020 CVE-2019-16019 CVE-2019-16018 |
CWE-ID | CWE-754 CWE-399 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cisco IOS XR Operating systems & Components / Operating system |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains information about 7 vulnerabilities.
EUVDB-ID: #VU24524
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2019-15989
CWE-ID:
CWE-754 - Improper Check for Unusual or Exceptional Conditions
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect processing of a Border Gateway Protocol (BGP) update message that contains a specific BGP attribute. A remote attacker can send specially crafted Border Gateway Protocol Attribute update messages and cause the BGP process to restart unexpectedly, resulting in a DoS condition.
MitigationThis vulnerability has been patched in the following patches only:
Cisco IOS XR: 6.6.1 - 7.0.1
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU24522
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2019-16023
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect processing of Border Gateway Protocol (BGP) update messages that contain crafted Ethernet VPN (EVPN) attributes. A remote attacker can send specially crafted Mcast Join Originator Router Address update messages with Length parameter and perform a denial of service attack.
This vulnerability has been patched in the following patches only:
Cisco IOS XR: 6.6.1 - 7.0.1
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU24521
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2019-16022
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect processing of Border Gateway Protocol (BGP) update messages that contain crafted Ethernet VPN (EVPN) attributes. A remote attacker can send specially crafted Multicast Join Nonstandard Group update messages with Length parameter and perform a denial of service attack.
This vulnerability has been patched in the following patches only:
Cisco IOS XR: 6.6.1 - 7.0.1
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU24520
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2019-16021
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect processing of Border Gateway Protocol (BGP) update messages that contain crafted Ethernet VPN (EVPN) attributes. A remote attacker can send specially crafted Multicast Leave Source update messages and perform a denial of service attack.
This vulnerability has been patched in the following patches only:
Cisco IOS XR: 6.6.1 - 7.0.1
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU24519
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2019-16020
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect processing of Border Gateway Protocol (BGP) update messages that contain crafted Ethernet VPN (EVPN) attributes. A remote attacker can send specially crafted Multicast Leave update messages and perform a denial of service attack.
This vulnerability has been patched in the following patches only:
Cisco IOS XR: 6.6.1 - 7.0.1
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU24518
Risk: High
CVSSv3.1: 7.9 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2019-16019
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect processing of Border Gateway Protocol (BGP) update messages that contain crafted Ethernet VPN (EVPN) attributes. A remote attacker can send specially crafted BGP EVPN Multicast Join Group update messages with length set to zero and perform a denial of service attack.
This vulnerability has been patched in the following patches only:
Cisco IOS XR: 6.6.1 - 7.0.1
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-evpn
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU24517
Risk: Medium
CVSSv3.1: 6.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:N/A:H/E:U/RL:U/RC:C]
CVE-ID: CVE-2019-16018
CWE-ID:
CWE-399 - Resource Management Errors
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect processing of a Border Gateway Protocol (BGP) update message that contains crafted Ethernet VPN (EVPN) attributes. A remote attacker can send specially crafted Mcast Join in RR/ASBR/Retain Route target message, wait for a user on the device to display the EVPN operational routes’ status and cause the BGP process to restart unexpectedly, resulting in a DoS condition.
MitigationThis vulnerability has been patched in the following patches only:
Cisco IOS XR: 6.6.1 - 7.0.1
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-routes
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.