First published: Sat Jun 14 2014(Updated: )
Cisco IOS XR 4.1.2 through 5.1.1 on ASR 9000 devices, when a Trident-based line card is used, allows remote attackers to cause a denial of service (NP chip and line card reload) via malformed IPv6 packets, aka Bug ID CSCun71928.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 | =4.1.2 | |
Cisco IOS XRv 9000 | =4.2.0 | |
Cisco IOS XRv 9000 | =4.3.1 | |
Cisco IOS XRv 9000 | =5.1.0 | |
Cisco IOS XRv 9000 | =5.1.1 | |
Cisco ASR 9001 | ||
Cisco ASR 9006 Router | ||
Cisco ASR 9010 Router | ||
Cisco ASR 9904 | ||
Cisco ASR 9912 | ||
Cisco ASR 9922 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2176 has been classified as a high severity vulnerability due to its ability to cause a denial of service.
To mitigate CVE-2014-2176, users should upgrade their Cisco IOS XR software to a version that is not affected, such as 5.1.2 or later.
CVE-2014-2176 affects Cisco ASR 9000 series routers running specific versions of Cisco IOS XR software.
CVE-2014-2176 allows remote attackers to send malformed IPv6 packets that can lead to NP chip and line card reloads.
You can determine vulnerability to CVE-2014-2176 by checking your device's current IOS XR version against the affected versions listed in the advisory.