First published: Tue Nov 26 2019(Updated: )
A vulnerability in the access-control logic of the NETCONF over Secure Shell (SSH) of Cisco IOS XR Software may allow connections despite an access control list (ACL) that is configured to deny access to the NETCONF over SSH of an affected device. The vulnerability is due to a missing check in the NETCONF over SSH access control list (ACL). An attacker could exploit this vulnerability by connecting to an affected device using NETCONF over SSH. A successful exploit could allow the attacker to connect to the device on the NETCONF port. Valid credentials are required to access the device. This vulnerability does not affect connections to the default SSH process on the device.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR | =6.5.1 | |
Cisco IOS XR | =6.5.2 | |
Cisco IOS XR | =6.5.3 | |
Cisco Asr 9001 | ||
Cisco Asr 9006 | ||
Cisco Asr 9010 | ||
Cisco Asr 9901 | ||
Cisco Asr 9904 | ||
Cisco Asr 9912 | ||
Cisco Asr 9922 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15998 is a vulnerability in the access-control logic of the NETCONF over Secure Shell (SSH) of Cisco IOS XR Software.
The severity of CVE-2019-15998 is medium, with a severity value of 5.3.
Cisco IOS XR versions 6.5.1, 6.5.2, and 6.5.3 are affected by CVE-2019-15998.
Cisco ASR routers (e.g., ASR 9001, ASR 9006, ASR 9010, ASR 9901, ASR 9904, ASR 9912, ASR 9922) are not vulnerable to CVE-2019-15998.
To fix CVE-2019-15998, it is recommended to apply the necessary updates provided by Cisco.