Vulnerability identifier: #VU6400
Vulnerability risk: Medium
CVSSv3.1: 7.5 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID:
CWE-ID:
CWE-399
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cisco IOS XR
Operating systems & Components /
Operating system
Vendor: Cisco Systems, Inc
Description
The vulnerability alows a remote attacker to cause DoS condition on the target device.
The weakness exists due to improper handling of gRPC requests in the Event Management Service daemon (emsd) of Cisco IOS XR routers. A remote attacker can send unauthenticated gRPC requests to the affected device and crash the device in such a manner that manual intervention is required to recover.
Successful exploitation of the vulnerability may result in denial of service.
Mitigation
Update to version 6.1.2 or later.
Vulnerable software versions
Cisco IOS XR: 6.0.1 - 6.1.1
External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-ios-xr
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.