#VU46126 Resource exhaustion


Published: 2020-08-29

Vulnerability identifier: #VU46126

Vulnerability risk: High

CVSSv3: 8.6 [CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:H/RL:U/RC:C]

CVE-ID: CVE-2020-3566

CWE-ID: CWE-400

Exploitation vector: Network

Exploit availability: No

Vulnerable software: Cisco ASR 9000 Series Aggregation Services Routers
Hardware solutions / Routers & switches, VoIP, GSM, etc
Cisco IOS XR
Operating systems & Components / Operating system

Vendor: Cisco Systems, Inc

Description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient queue management for Internet Group Management Protocol (IGMP) packets in the Distance Vector Multicast Routing Protocol (DVMRP) feature of Cisco IOS XR Software. A remote attacker can trigger resource exhaustion by sending crafted IGMP  traffic to the affected device and perform a denial of service (DoS) attack.

Note: this vulnerability is being actively exploited in the wild.

Mitigation
Cybersecurity Help is currently unaware of any official solution to address this vulnerability.

Vulnerable software versions

Cisco ASR 9000 Series Aggregation Services Routers: 6.4.2, 6.6, 6.6.3, 7.0

Cisco IOS XR: 6.0.1, 6.0.2, 6.1.1, 6.1.2, 6.1.3, 6.1.4, 6.2.1, 6.2.3, 6.2.25, 6.3.2, 6.3.3, 6.3.15, 6.4.1, 6.4.2, 6.4.3, 6.5.2, 6.5.3, 6.6.1, 6.6.2, 6.6.3, 6.6.25, 7.0.1, 7.0.2, 7.1.1, 7.1.2, 7.1.3, 7.2.1, 7.3.1

CPE

External links
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dvmrp-memexh-dSmpdvfz
https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvv54838


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability