Cisco IOS XE Software Change of Authorization DoS (cisco-sa-20190925-tsec)

high Nessus Plugin ID 129943

Synopsis

The remote device is missing a vendor-supplied security patch

Description

A denial of service (DoS) vulnerability exists in the RADIUS Change of Authorization (CoA) code of Cisco TrustSec within Cisco IOS XE software due to improper handling of malformed packet. An unauthenticated, remote attacker can exploit this issue, via sending a malformed packet to an affected device, to cause the DoS condition on an affected device.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug IDs CSCvg56762, CSCvm92998

See Also

http://www.nessus.org/u?48ce2f62

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg56762

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvm92998

Plugin Details

Severity: High

ID: 129943

File Name: cisco-sa-20190925-tsec-iosxe.nasl

Version: 1.10

Type: local

Family: CISCO

Published: 10/15/2019

Updated: 1/8/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2019-12669

CVSS v3

Risk Factor: High

Base Score: 7.5

Temporal Score: 6.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xe

Required KB Items: Host/Cisco/IOS-XE/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 9/25/2019

Vulnerability Publication Date: 9/25/2019

Reference Information

CVE: CVE-2019-12669

CWE: 20

CISCO-SA: cisco-sa-20190925-tsec

IAVA: 2019-A-0352-S

CISCO-BUG-ID: CSCvg56762, CSCvm92998