First published: Wed Jan 31 2018(Updated: )
A vulnerability in the IPv6 subsystem of Cisco IOS XR Software Release 5.3.4 for the Cisco Aggregation Services Router (ASR) 9000 Series could allow an unauthenticated, remote attacker to trigger a reload of one or more Trident-based line cards, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect handling of IPv6 packets with a fragment header extension. An attacker could exploit this vulnerability by sending IPv6 packets designed to trigger the issue either to or through the Trident-based line card. A successful exploit could allow the attacker to trigger a reload of Trident-based line cards, resulting in a DoS during the period of time the line card takes to restart. This vulnerability affects Cisco Aggregation Services Router (ASR) 9000 Series when the following conditions are met: The router is running Cisco IOS XR Software Release 5.3.4, and the router has installed Trident-based line cards that have IPv6 configured. A software maintenance upgrade (SMU) has been made available that addresses this vulnerability. The fix has also been incorporated into service pack 7 for Cisco IOS XR Software Release 5.3.4. Cisco Bug IDs: CSCvg46800.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR | =5.3.4 | |
Cisco Asr 9001 | ||
Cisco Asr 9006 | ||
Cisco Asr 9010 | ||
Cisco Asr 9904 | ||
Cisco Asr 9906 | ||
Cisco Asr 9910 | ||
Cisco Asr 9912 | ||
Cisco Asr 9922 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-0136 is a vulnerability in the IPv6 subsystem of Cisco IOS XR Software Release 5.3.4 for the Cisco Aggregation Services Router (ASR) 9000 Series.
CVE-2018-0136 could allow an unauthenticated, remote attacker to trigger a reload of one or more Trident-based line cards on Cisco ASR 9000 Series, resulting in a denial of service (DoS) condition.
CVE-2018-0136 has a severity rating of 8.6, which is considered high.
To fix CVE-2018-0136, it is recommended to upgrade to a fixed software release.
More information about CVE-2018-0136 can be found on the Cisco Security Advisory website.