First published: Fri Oct 05 2018(Updated: )
A vulnerability in the implementation of Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain BGP update messages. An attacker could exploit this vulnerability by sending BGP update messages that include a specific, malformed attribute to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR | =6.0.1 | |
Cisco IOS XR | =6.0.2 | |
Cisco IOS XR | =6.1.1 | |
Cisco IOS XR | =6.1.2 | |
Cisco IOS XR | =6.1.3 | |
Cisco IOS XR | =6.1.4 | |
Cisco IOS XR | =6.2.1 | |
Cisco IOS XR | =6.2.2 | |
Cisco IOS XR | =6.2.3 | |
Cisco IOS XR | =6.4.1 | |
Cisco Asr 9001 | ||
Cisco Asr 9006 | ||
Cisco Asr 9010 | ||
Cisco Asr 9901 | ||
Cisco Asr 9904 | ||
Cisco Asr 9906 | ||
Cisco Asr 9910 | ||
Cisco Asr 9912 | ||
Cisco Asr 9922 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15428 is a vulnerability in the implementation of Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software, which could allow a remote attacker to cause a denial of service (DoS) condition.
CVE-2018-15428 can cause a denial of service (DoS) condition in Cisco IOS XR Software.
CVE-2018-15428 has a severity rating of 6.8 (medium).
Cisco IOS XR Software versions 6.0.1 to 6.4.1 are affected by CVE-2018-15428.
To mitigate CVE-2018-15428, it is recommended to apply the relevant security updates provided by Cisco.