- Description
- A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.9:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4D42A82B-7241-4564-BCC1-9C4E7EB18881"
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6"
}
],
"operator": "OR"
},
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "70352B04-C3FD-47F5-A2F8-691CF63EB50D"
},
{
"criteria": "cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "FE063AF2-5579-4D7E-8829-9102FC7CB994"
},
{
"criteria": "cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "51938C0A-AFDB-4B12-BB64-9C67FC0C738F"
},
{
"criteria": "cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "A18E4A46-10D3-48F8-9E92-377ACA447257"
},
{
"criteria": "cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*",
"vulnerable": false,
"matchCriteriaId": "67D5E61B-9F17-4C56-A1BB-3EE08CB62C53"
}
],
"operator": "OR"
}
],
"operator": "AND"
}
]