#VU12068 Improper input validation in Cisco ASR 5000 Series - CVE-2018-0256

 

#VU12068 Improper input validation in Cisco ASR 5000 Series - CVE-2018-0256

Published: April 20, 2018


Vulnerability identifier: #VU12068
Vulnerability risk: Low
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2018-0256
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability: No public exploit available
Vulnerable software:
Cisco ASR 5000 Series
Software vendor:
Cisco Systems, Inc

Description

The vulnerability allow a remote unauthenticated attacker to cause DoS condition on the target system.

The weakness exists in the peer-to-peer message processing functionality due to incorrect validation of peer-to-peer packet headers. A remote attacker can send a specially crafted peer-to-peer packet, trigger the SESSMGR process to restart unexpectedly, which can briefly impact traffic while the SESSMGR process restarts, and cause the service to crash.

Remediation

Update to versions P2P_2.21, P2P_2.20.896, P2P_2.20.894, P2P_2.19.895, P2P_2.19.892 or P2P_2.19.

External links