Overview
- Description
- A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
CVSS 3.0
- Type
- Secondary
- Base score
- 8.6
- Impact score
- 4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 7.8
- Impact score
- 6.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:N/A:C
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xe:16.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4D42A82B-7241-4564-BCC1-9C4E7EB18881" }, { "criteria": "cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB6BD18B-B9BD-452F-986E-16A6668E46B6" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "70352B04-C3FD-47F5-A2F8-691CF63EB50D" }, { "criteria": "cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FE063AF2-5579-4D7E-8829-9102FC7CB994" }, { "criteria": "cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "51938C0A-AFDB-4B12-BB64-9C67FC0C738F" }, { "criteria": "cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A18E4A46-10D3-48F8-9E92-377ACA447257" }, { "criteria": "cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "67D5E61B-9F17-4C56-A1BB-3EE08CB62C53" } ], "operator": "OR" } ], "operator": "AND" } ]