Cisco Aggregation Services Router 9000 Series IPv6 Fragment Header DoS (cisco-sa-20180131-ipv6)

high Nessus Plugin ID 133861

Synopsis

The remote device is missing a vendor-supplied security patch

Description

According to its self-reported version, Cisco IOS XR Software is affected by a denial of service (DoS) vulnerability in the IPv6 subsystem due to incorrect handling of IPv6 packets with a fragment header extension. An unauthenticated, remote attacker can exploit this, by sending IPv6 packets designed to trigger the issue either to or through the Trident-based line card, in order to trigger a reload of Trident-based line cards and cause a denial of service. This vulnerability affects only Cisco Aggregation Services Router (ASR) 9000 Series devices.

Please see the included Cisco BIDs and Cisco Security Advisory for more information

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCvg46800.

See Also

http://www.nessus.org/u?ae7d2a6f

https://bst.cloudapps.cisco.com/bugsearch/bug/CSCvg46800

Plugin Details

Severity: High

ID: 133861

File Name: cisco-sa-20180131-ipv6.nasl

Version: 1.8

Type: combined

Family: CISCO

Published: 2/21/2020

Updated: 4/8/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.4

CVSS v2

Risk Factor: High

Base Score: 7.8

Temporal Score: 5.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS Score Source: CVE-2018-0136

CVSS v3

Risk Factor: High

Base Score: 8.6

Temporal Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios_xr

Required KB Items: Host/Cisco/IOS-XR/Version, Host/Cisco/IOS-XR/Model

Exploit Ease: No known exploits are available

Patch Publication Date: 1/31/2018

Vulnerability Publication Date: 1/31/2018

Reference Information

CVE: CVE-2018-0136

CISCO-SA: cisco-sa-20180131-ipv6

CISCO-BUG-ID: CSCvg46800