Improper input validation in Cisco ASR 5000 Series - CVE-2018-0256
Published: April 20, 2018
Vulnerability identifier: #VU12068
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0256
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco ASR 5000 Series
Cisco ASR 5000 Series
Detailed vulnerability description
The vulnerability allow a remote unauthenticated attacker to cause DoS condition on the target system.
The weakness exists in the peer-to-peer message processing functionality due to incorrect validation of peer-to-peer packet headers. A remote attacker can send a specially crafted peer-to-peer packet, trigger the SESSMGR process to restart unexpectedly, which can briefly impact traffic while the SESSMGR process restarts, and cause the service to crash.
The weakness exists in the peer-to-peer message processing functionality due to incorrect validation of peer-to-peer packet headers. A remote attacker can send a specially crafted peer-to-peer packet, trigger the SESSMGR process to restart unexpectedly, which can briefly impact traffic while the SESSMGR process restarts, and cause the service to crash.
How to mitigate CVE-2018-0256
Update to versions P2P_2.21, P2P_2.20.896, P2P_2.20.894, P2P_2.19.895, P2P_2.19.892 or P2P_2.19.