CVE-2023-20049
Published Mar 9, 2023
Last updated a year ago
Overview
- Description
- A vulnerability in the bidirectional forwarding detection (BFD) hardware offload feature of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers, ASR 9902 Compact High-Performance Routers, and ASR 9903 Compact High-Performance Routers could allow an unauthenticated, remote attacker to cause a line card to reset, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of malformed BFD packets that are received on line cards where the BFD hardware offload feature is enabled. An attacker could exploit this vulnerability by sending a crafted IPv4 BFD packet to an affected device. A successful exploit could allow the attacker to cause line card exceptions or a hard reset, resulting in loss of traffic over that line card while the line card reloads.
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.5
- Impact score
- 3.6
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
- Severity
- HIGH
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "873225C3-D2D1-41C0-9C75-016E53A7BBEB", "versionEndExcluding": "7.5.3" }, { "criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "864E90A6-B93D-4213-85D8-A2D847848A9E", "versionEndExcluding": "7.6.2", "versionStartIncluding": "7.6" }, { "criteria": "cpe:2.3:o:cisco:ios_xr:7.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0C8039EF-44D6-4C19-A3B3-37B75FB8D640" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:cisco:asr_9000v-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DB91BE23-C710-473F-8E43-0E0DE760F8AD" }, { "criteria": "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "324C97E6-1810-404F-9F45-6240F99FF039" }, { "criteria": "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "57EB55BB-41B7-40A1-B6F5-142FE8AB4C16" }, { "criteria": "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "433F4A82-04A4-4EAA-8C19-F7581DCD8D29" }, { "criteria": "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2D5E60AB-94FF-448A-89D8-5D2197E21C74" }, { "criteria": "cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "91474DBC-FB31-4DDF-96C5-311FA1D53A74" }, { "criteria": "cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FA241214-2F05-4360-9B50-385355E29CF4" }, { "criteria": "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A93212A4-50AB-42E7-89A4-5FBBAEA050C3" }, { "criteria": "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EDA53A61-98B3-458C-8893-61CD7D6B1E48" }, { "criteria": "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F396564E-B477-4A27-A189-CEB737552E25" }, { "criteria": "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5445CC54-ACFB-4070-AF26-F91FEAA85181" }, { "criteria": "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D7AA58E5-D7E1-48CF-93FF-C60EB85B2BC7" } ], "operator": "OR" } ], "operator": "AND" } ]