#VU24158 Input validation error


Published: 2020-01-09

Vulnerability identifier: #VU24158

Vulnerability risk: Medium

CVSSv3: 5.9 [CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2019-16026

CWE-ID: CWE-20

Exploitation vector: Network

Exploit availability: No

Vulnerable software: Cisco Mobility Management Entity
Hardware solutions / Other hardware appliances

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack on an eNodeB that is connected to an affected device.

The vulnerability exists due to insufficient validation of user-supplied input in the implementation of the Stream Control Transmission Protocol (SCTP). A remote attacker can leverage a man-in-the-middle position between the eNodeB and the MME, then send a specially crafted SCTP message to the MME and cause the MME to stop sending SCTP messages to the eNodeB, results in denial of service condition.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

Cisco Mobility Management Entity: -

CPE

External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200108-mme-dos


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability