First published: Fri Jan 11 2019(Updated: )
A vulnerability in Cisco 900 Series Aggregation Services Router (ASR) software could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient handling of certain broadcast packets ingress to the device. An attacker could exploit this vulnerability by sending large streams of broadcast packets to an affected device. If successful, an exploit could allow an attacker to impact services running on the device, resulting in a partial DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASR 900 Series firmware | =16.6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-15464 has been rated as a high severity vulnerability due to its potential to cause a partial denial of service on affected Cisco ASR 900 Series devices.
To remediate CVE-2018-15464, you should upgrade the affected Cisco ASR 900 Series software to a patched version provided by Cisco.
CVE-2018-15464 affects devices running Cisco ASR 900 Series software version 16.6.2.
CVE-2018-15464 is caused by insufficient handling of certain broadcast packets which allows for potential manipulation by remote attackers.
The potential impacts of CVE-2018-15464 include causing a partial denial of service which can disrupt normal operations of affected Cisco routers.