First published: Wed Dec 14 2016(Updated: )
A vulnerability in IPv6 packet fragment reassembly of StarOS for Cisco Aggregation Services Router (ASR) 5000 Series Switch could allow an unauthenticated, remote attacker to cause an unexpected reload of the Network Processing Unit (NPU) process. More Information: CSCva84552. Known Affected Releases: 20.0.0 21.0.0 21.0.M0.64702. Known Fixed Releases: 21.0.0 21.0.0.65256 21.0.M0.64970 21.0.V0.65150 21.1.A0.64973 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.VC0.65203.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASR 5000 Series Aggregation Services Routers | =20.0.0 | |
Cisco ASR 5000 Series Aggregation Services Routers | =21.0.0 | |
Cisco ASR 5000 Series Aggregation Services Routers | =21.0.m0.64702 | |
Cisco ASR 5000 firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6467 has a high severity rating due to its potential to cause a denial of service.
To mitigate CVE-2016-6467, upgrade to a patched version of the Cisco ASR 5000 Series software above version 21.0.0.
CVE-2016-6467 affects Cisco ASR 5000 Series Aggregation Services Routers running versions 20.0.0 and 21.0.0.
Yes, CVE-2016-6467 can be exploited remotely without authentication.
The impact of CVE-2016-6467 is an unexpected reload of the Network Processing Unit (NPU) process.