First published: Wed Sep 25 2019(Updated: )
A vulnerability in the ingress packet processing function of Cisco IOS Software for Cisco Catalyst 4000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when processing TCP packets directed to the device on specific Cisco Catalyst 4000 Series Switches. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device. A successful exploit could cause the affected device to run out of buffer resources, impairing operations of control plane and management plane protocols, resulting in a DoS condition. This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.2\(3\)e1 | |
Cisco IOS | =15.2\(4\)e3 | |
Cisco Catalyst 4500 Supervisor Engine 6-e | ||
Cisco Catalyst 4500 Supervisor Engine 6l-e | ||
Cisco Catalyst 4900m | ||
Cisco Catalyst 4948e | ||
Cisco Catalyst 4948e-f |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-12652.
The severity rating of CVE-2019-12652 is 7.5 (high).
The affected software of CVE-2019-12652 is Cisco IOS Software for Cisco Catalyst 4000 Series Switches.
The impact of CVE-2019-12652 is a denial of service (DoS) condition on an affected device.
Yes, Cisco has released a security advisory with information on how to apply the necessary updates to address the vulnerability. Please refer to their official website for more details.