First published: Wed Sep 25 2019(Updated: )
A vulnerability in the common Session Initiation Protocol (SIP) library of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient sanity checks on an internal data structure. An attacker could exploit this vulnerability by sending a sequence of malicious SIP messages to an affected device. An exploit could allow the attacker to cause a NULL pointer dereference, resulting in a crash of the iosd process. This triggers a reload of the device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE | =15.6\(1\)s4.2 | |
Cisco IOS XE | =16.3.8 | |
Cisco IOS XE | =16.9.1 | |
Cisco 1000 Integrated Services Router | ||
Cisco 1100 Integrated Services Router | ||
Cisco 4000 Integrated Services Router | ||
Cisco 4221 Integrated Services Router | ||
Cisco 4321 Integrated Services Router | ||
Cisco 4331 Integrated Services Router | ||
Cisco 4351 Integrated Services Router | ||
Cisco 4431 Integrated Services Router | ||
Cisco 4451-x Integrated Services Router | ||
Cisco ASR 1000 | ||
Cisco Asr 1001-hx | ||
Cisco Asr 1001-x | ||
Cisco Asr 1002-hx | ||
Cisco Asr 1002-x | ||
Cisco Cloud Services Router 1000v | ||
Cisco Integrated Services Virtual Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-12654.
The severity of CVE-2019-12654 is high, with a severity score of 7.5.
CVE-2019-12654 could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition.
Versions 15.6(1)s4.2, 16.3.8, and 16.9.1 of Cisco IOS XE are affected by CVE-2019-12654.
To fix the vulnerability, Cisco recommends upgrading to a fixed software release.