First published: Wed Sep 25 2019(Updated: )
A vulnerability in Unified Threat Defense (UTD) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper validation of IPv6 packets through the UTD feature. An attacker could exploit this vulnerability by sending IPv6 traffic through an affected device that is configured with UTD. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =16.3.6 | |
Cisco 4321/k9 Integrated Services Router | ||
Cisco 4331/k9-rf Integrated Services Router | ||
Cisco 4351/k9-rf Integrated Services Router | ||
Cisco 4431 Integrated Services Router | ||
Cisco 4451-X Integrated Services Router | ||
Cisco ASR 1000 Series | ||
Cisco ASR 1001 | ||
Cisco ASR 1001-X | ||
Cisco ASR 1002 Fixed Router | ||
Cisco ASR 1002-X | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-12x48UQ-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-12X48UR-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-12x48UZ-L | ||
Cisco Catalyst 3650-12x48uz-s | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-24PD-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-24PS-E | ||
Cisco Catalyst 3650-24PS-L | ||
Cisco Catalyst 3650-24PS | ||
Cisco Catalyst 3650-24TD-E | ||
Cisco Catalyst 3650-24TD-L | ||
Cisco Catalyst 3650-24TD Switch | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-24TS-L | ||
Cisco Catalyst 3650-24TS-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48FQ-E | ||
Cisco Catalyst 3650-48FQ-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48FQM Switch | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48FQM Switch | ||
Cisco Catalyst 3650 Series Switch | ||
Cisco Catalyst 3650 Series Switch WS-C3650-48FS | ||
Cisco Catalyst 3650 Series Switch WS-C3650-48FS | ||
Cisco Catalyst 3650-48PD-E | ||
Cisco Catalyst 3650-48PD | ||
Cisco Catalyst 3650-48PD-S | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48PQ-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-48PS-L | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 Series | ||
Cisco Catalyst 3650-48TQ-S | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650-48TS Switch | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650 | ||
Cisco Catalyst 3650-8X24UQ | ||
Cisco Catalyst 3650-8X24UQ | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 Series | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 9300-24s-e Firmware | ||
Cisco Catalyst 3850-24S-S | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-24T-L | ||
Cisco Catalyst 3850-24T-S | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850-24XU | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-48F-E | ||
Cisco Catalyst 3850-48F-L | ||
Cisco Catalyst 3850-48F-S | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-48P-S | ||
Cisco Catalyst 3850-48T-E | ||
Cisco Catalyst 3850-48T-L | ||
Cisco Catalyst 3850 Series | ||
Cisco Catalyst 3850-48U-E | ||
Cisco Catalyst 3850-48U | ||
Cisco Catalyst 3850-48U | ||
Cisco Catalyst 3850 | ||
Cisco Catalyst 3850-48XS | ||
Cisco Catalyst 3850-48XS | ||
Cisco Catalyst 3850-48XS-S | ||
Cisco Catalyst 3850-12X48U-E | ||
Cisco Catalyst 3850-12X48U-L | ||
Cisco Catalyst 3850-12X48U-S | ||
Cisco Cloud Services Router 1000V |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-12657 is classified as critical due to its potential to cause device reloads by an unauthenticated remote attacker.
To fix CVE-2019-12657, it is recommended to upgrade the affected Cisco IOS XE Software to a version that has addressed the vulnerability.
CVE-2019-12657 affects Cisco IOS XE Software version 16.3.6 and potentially devices using this software such as routers and switches.
Yes, CVE-2019-12657 can be exploited remotely without authentication, allowing attackers to reload the affected device.
CVE-2019-12657 enables a denial-of-service attack through improper validation of IPv6 packets, leading to device reloads.