#VU12068 Improper input validation in Cisco ASR 5000 Series - CVE-2018-0256
Published: April 20, 2018
Vulnerability identifier: #VU12068
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0256
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vulnerable software:
Cisco ASR 5000 Series
Cisco ASR 5000 Series
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allow a remote unauthenticated attacker to cause DoS condition on the target system.
The weakness exists in the peer-to-peer message processing functionality due to incorrect validation of peer-to-peer packet headers. A remote attacker can send a specially crafted peer-to-peer packet, trigger the SESSMGR process to restart unexpectedly, which can briefly impact traffic while the SESSMGR process restarts, and cause the service to crash.
The weakness exists in the peer-to-peer message processing functionality due to incorrect validation of peer-to-peer packet headers. A remote attacker can send a specially crafted peer-to-peer packet, trigger the SESSMGR process to restart unexpectedly, which can briefly impact traffic while the SESSMGR process restarts, and cause the service to crash.
Remediation
Update to versions P2P_2.21, P2P_2.20.896, P2P_2.20.894, P2P_2.19.895, P2P_2.19.892 or P2P_2.19.