Cisco IOS Software Bidirectional Forwarding Detection DoS (cisco-sa-20180328-bfd)

high Nessus Plugin ID 132680

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version, Cisco IOS is affected by a denial of service (DoS) vulnerability in the Bidirectional Forwarding Detection (BFD) offload implementation due to insufficient error handling when the BFD header in a BFD packet is incomplete. An unauthenticated, remote attacker could exploit this, by sending a crafted BFD message to or across an affected switch, in order to crash the iosd process and trigger a system reload.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCvc40729.

See Also

http://www.nessus.org/u?c66d9346

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvc40729

Plugin Details

Severity: High

ID: 132680

File Name: cisco-sa-20180328-bfd.nasl

Version: 1.17

Type: combined

Family: CISCO

Published: 1/7/2020

Updated: 4/25/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.0

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 6.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2018-0155

CVSS v3

Risk Factor: High

Base Score: 8.6

Temporal Score: 8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version, Host/Cisco/IOS/Model, Settings/ParanoidReport

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 3/28/2018

Vulnerability Publication Date: 3/28/2018

CISA Known Exploited Vulnerability Due Dates: 3/17/2022

Reference Information

CVE: CVE-2018-0155

BID: 103565

CISCO-SA: cisco-sa-20180328-bfd

IAVA: 2018-A-0098-S

CISCO-BUG-ID: CSCvc40729