First published: Wed Sep 25 2019(Updated: )
A vulnerability in the Ident protocol handler of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability exists because the affected software incorrectly handles memory structures, leading to a NULL pointer dereference. An attacker could exploit this vulnerability by opening a TCP connection to specific ports and sending traffic over that connection. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =fuji-16.7.1 | |
Cisco IOS XE | =fuji-16.8.1 | |
Cisco 1100 | ||
Cisco 4221 | ||
Cisco 4321 | ||
Cisco 4351 | ||
Cisco 4431 | ||
Cisco 4451-x | ||
Cisco ASR 1000 | ||
Cisco Asr 1001-hx | ||
Cisco Asr 1001-x | ||
Cisco Asr 1002-hx | ||
Cisco Asr 1002-x | ||
Cisco Asr 900 | ||
Cisco Asr 920-10sz-pd | ||
Cisco Asr 920-12cz-a | ||
Cisco Asr 920-12cz-d | ||
Cisco Asr 920-12sz-im | ||
Cisco Asr 920-24sz-im | ||
Cisco Asr 920-24sz-m | ||
Cisco Asr 920-24tz-m | ||
Cisco Asr 920-4sz-a | ||
Cisco Asr 920-4sz-d | ||
Cisco Cloud Services Router 1000v | ||
Cisco Ncs 4201 | ||
Cisco Ncs 4202 | ||
Cisco Ncs 4206 | ||
Cisco Ncs 4216 | ||
Cisco Network Convergence System 520 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12647 is a vulnerability in the Ident protocol handler of Cisco IOS and IOS XE Software that could allow an unauthenticated, remote attacker to cause an affected device to reload.
CVE-2019-12647 has a severity rating of 7.5 (high).
An attacker can exploit CVE-2019-12647 by sending specially crafted Ident protocol packets to the affected device, causing it to reload.
Cisco IOS XE Software versions fuji-16.7.1 and fuji-16.8.1 are affected by CVE-2019-12647.
To fix CVE-2019-12647, Cisco has released software updates that address the vulnerability. It is recommended to update to a fixed software version.