#VU12065 Resource management errors in Cisco ASR 5000 Series


Published: 2018-04-20

Vulnerability identifier: #VU12065

Vulnerability risk: Low

CVSSv3.1: 4.6 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-0273

CWE-ID: CWE-399

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco ASR 5000 Series
Hardware solutions / Firmware

Vendor: Cisco Systems, Inc

Description
The vulnerability allows a remote unauthenticated attacker to cause DoS condition on the target system.

The weakness exists due to improper processing of corrupted Internet Key Exchange Version 2 (IKEv2) messages. A remote attacker can send specially crafted IKEv2 messages, trigger the ipsecmgr service to reload, all IPsec VPN tunnels to be terminated and prevent new tunnels from being established and cause the service to crash.

Mitigation
Update to versions 21.2.6, 21.4.M0.67792, 21.4.D0.67794, 21.4.C0.68000, 21.4.A0.67168, 21.4.A0.67147, 21.4.0, 21.4.0.68051, 21.3.a0.68015, 21.3.M0.67158, 21.3.M0.67139, 21.3.J0.67155, 21.3.J0.67141 or 21.2.6.67773.

Vulnerable software versions

Cisco ASR 5000 Series: 19.4.2.65120 - 21.4.0


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180418-starosasr


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability