First published: Mon Jul 10 2017(Updated: )
A vulnerability in Multicast Source Discovery Protocol (MSDP) ingress packet processing for Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause the MSDP session to be unexpectedly reset, causing a short denial of service (DoS) condition. The MSDP session will restart within a few seconds. More Information: CSCvd94828. Known Affected Releases: 4.3.2.MCAST 6.0.2.BASE. Known Fixed Releases: 6.3.1.19i.MCAST 6.2.3.1i.MCAST 6.2.2.17i.MCAST 6.1.4.12i.MCAST.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 | =4.3.2.mcast | |
Cisco IOS XRv 9000 | =6.0.2.base |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6731 is considered a medium severity vulnerability that can lead to a denial of service condition.
To fix CVE-2017-6731, upgrade to the patched versions of Cisco IOS XR Software as recommended in the security advisory.
CVE-2017-6731 can allow an unauthenticated remote attacker to reset the MSDP session, causing temporary service interruptions.
CVE-2017-6731 affects Cisco IOS XR versions 4.3.2.mcast and 6.0.2.base.
No, exploitation of CVE-2017-6731 does not require authentication, making it particularly concerning for vulnerable systems.