Overview
- Description
- An IKE Packet Parsing Denial of Service Vulnerability in the ipsecmgr process of Cisco ASR 5000 Software could allow an unauthenticated, remote attacker to cause the ipsecmgr process to reload. More Information: CSCuy06917 CSCuy45036 CSCuy59525. Known Affected Releases: 20.0.0 20.0.M0.62842 20.0.v0 20.0.M0.63229 20.1.0 20.1.a0 20.1.v0 21.0.0 21.0.v0. Known Fixed Releases: 20.0.0 20.0.0.63250 20.0.M0.63148 20.0.R0.63294 20.0.R0.63316 20.0.V0.63170 20.0.VG0.63188 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.A0.63166 20.2.A0.63174 20.1.A0.63232 20.2.A0.63237 20.0.M0.63226 20.0.M0.63229 20.0.R0.63294 20.0.R0.63316 20.0.V0.63263 20.0.VG0.63233 20.0.v0 20.0.v0.64175 20.0.vg0.63522 20.1.0 20.1.0.63959 20.1.M0.63876 20.1.T0.63886 20.1.V0.64231 20.1.VA0.64194 20.1.VB0.64210 20.1.a0 20.1.a0.64023 20.1.v0 20.1.v0.64607 20.2.A0.63895 21.0.0 21.0.0.65256 21.0.M0.63881 21.0.M0.64281 21.0.PP0.64366 21.0.V0.65052 21.0.v0 21.0.v0.65831 21.0.vb0.65887 21.1.R0.65130 21.1.R0.65135.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:P
Weaknesses
- nvd@nist.gov
- CWE-399
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BCE327B4-D5D7-48CD-81CE-2729CA9DC7D2" }, { "criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "819DA43C-A5B8-4EEC-B924-727D47477614" }, { "criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.1.a0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "49787FCE-06CF-4A4E-ACC0-AC83A25B8440" }, { "criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.1.v0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8B8F5686-FA3A-43C9-94B8-0F483ADC02FE" }, { "criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.m0.62842:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDE98F06-0B06-4B34-83AF-1678D6E0B2FD" }, { "criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.m0.63229:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C228B7E2-07E2-4894-BDE4-BDB2F9B24198" }, { "criteria": "cpe:2.3:a:cisco:asr_5000_series_software:20.0.v0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "232E0002-C9FE-4E4D-A83D-7BDC6507951B" }, { "criteria": "cpe:2.3:a:cisco:asr_5000_series_software:21.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4696D17E-9AD1-4F7F-B560-99A61F46867C" } ], "operator": "OR" } ] } ]