First published: Sun Jan 26 2020(Updated: )
A vulnerability in the implementation of the Stream Control Transmission Protocol (SCTP) on Cisco Mobility Management Entity (MME) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an eNodeB that is connected to an affected device. The vulnerability is due to insufficient input validation of SCTP traffic. An attacker could exploit this vulnerability by leveraging a man-in-the-middle position between the eNodeB and the MME and then sending a crafted SCTP message to the MME. A successful exploit would cause the MME to stop sending SCTP messages to the eNodeB, triggering a DoS condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco StarOS | <21.16.1 | |
Cisco ASR 5000 | ||
Cisco ASR 5500 | ||
Cisco Asr 5700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-16026 is a vulnerability in the implementation of the Stream Control Transmission Protocol (SCTP) on Cisco Mobility Management Entity (MME) that could allow a remote attacker to cause a denial of service (DoS) condition.
CVE-2019-16026 affects Cisco devices running Cisco StarOS version up to and excluding 21.16.1 on the Mobility Management Entity (MME).
The severity of CVE-2019-16026 is medium with a CVSS score of 5.9.
An unauthenticated remote attacker can exploit CVE-2019-16026 by sending specially crafted SCTP packets to the affected device's eNodeB, causing a denial of service (DoS) condition.
Yes, Cisco has released a security advisory with mitigation details for CVE-2019-16026. Please refer to the official Cisco advisory for more information.