First published: Wed Mar 27 2019(Updated: )
A vulnerability in the Network-Based Application Recognition (NBAR) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. This vulnerability is due to a parsing issue on DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through routers that are running an affected version and have NBAR enabled. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.1\(2\)sg8a | |
Cisco IOS | =15.1\(3\)svg3d | |
Cisco IOS | =15.1\(3\)svi1b | |
Cisco IOS | =15.1\(3\)svk4b | |
Cisco IOS | =15.1\(3\)svk4c | |
Cisco IOS | =15.1\(3\)svm3 | |
Cisco IOS | =15.1\(3\)svn2 | |
Cisco IOS | =15.1\(3\)svo1 | |
Cisco IOS | =15.1\(3\)svo2 | |
Cisco IOS | =15.1\(3\)svo3 | |
Cisco IOS | =15.1\(3\)svo4 | |
Cisco IOS | =15.1\(3\)svp1 | |
Cisco IOS | =15.1\(3\)svp2 | |
Cisco IOS | =15.1\(4\)m12c | |
Cisco IOS | =15.2\(3\)ea1 | |
Cisco IOS | =15.2\(4a\)ea5 | |
Cisco IOS | =15.3\(3\)ja1n | |
Cisco IOS | =15.3\(3\)jd | |
Cisco IOS | =15.3\(3\)jd2 | |
Cisco IOS | =15.3\(3\)jd3 | |
Cisco IOS | =15.3\(3\)jd4 | |
Cisco IOS | =15.3\(3\)jd5 | |
Cisco IOS | =15.3\(3\)jd6 | |
Cisco IOS | =15.3\(3\)jd7 | |
Cisco IOS | =15.3\(3\)jd8 | |
Cisco IOS | =15.3\(3\)jd9 | |
Cisco IOS | =15.3\(3\)jd11 | |
Cisco IOS | =15.3\(3\)jd12 | |
Cisco IOS | =15.3\(3\)jd13 | |
Cisco IOS | =15.3\(3\)jd14 | |
Cisco IOS | =15.3\(3\)je | |
Cisco IOS | =15.3\(3\)jf | |
Cisco IOS | =15.3\(3\)jf1 | |
Cisco IOS | =15.3\(3\)jf2 | |
Cisco IOS | =15.3\(3\)jf4 | |
Cisco IOS | =15.3\(3\)jf5 | |
Cisco IOS | =15.3\(3\)jf35 | |
Cisco IOS | =15.3\(3\)jg | |
Cisco IOS | =15.3\(3\)jg1 | |
Cisco IOS | =15.3\(3\)jh | |
Cisco IOS | =15.3\(3\)ji | |
Cisco IOS | =15.3\(3\)ji2 | |
Cisco IOS | =15.3\(3\)jnp | |
Cisco IOS | =15.3\(3\)jnp1 | |
Cisco IOS | =15.3\(3\)jnp3 | |
Cisco IOS | =15.3\(3\)jpb | |
Cisco IOS | =15.3\(3\)jpb1 | |
Cisco IOS | =15.3\(3\)jpc | |
Cisco IOS | =15.3\(3\)jpc1 | |
Cisco IOS | =15.3\(3\)jpc2 | |
Cisco IOS | =15.3\(3\)jpc3 | |
Cisco IOS | =15.3\(3\)jpc5 | |
Cisco IOS | =15.3\(3\)jpd | |
Cisco IOS | =15.5\(3\)m | |
Cisco IOS | =15.5\(3\)m0a | |
Cisco IOS | =15.5\(3\)m1 | |
Cisco IOS | =15.5\(3\)m2 | |
Cisco IOS | =15.5\(3\)m2a | |
Cisco IOS | =15.5\(3\)m3 | |
Cisco IOS | =15.5\(3\)m4 | |
Cisco IOS | =15.5\(3\)m4a | |
Cisco IOS | =15.5\(3\)m4b | |
Cisco IOS | =15.5\(3\)m4c | |
Cisco IOS | =15.5\(3\)m5 | |
Cisco IOS | =15.5\(3\)m5a | |
Cisco IOS | =15.5\(3\)s | |
Cisco IOS | =15.5\(3\)s0a | |
Cisco IOS | =15.5\(3\)s1 | |
Cisco IOS | =15.5\(3\)s1a | |
Cisco IOS | =15.5\(3\)s2 | |
Cisco IOS | =15.5\(3\)s3 | |
Cisco IOS | =15.5\(3\)s4 | |
Cisco IOS | =15.5\(3\)s5 | |
Cisco IOS | =15.5\(3\)sn | |
Cisco IOS | =15.5\(3\)sn0a | |
Cisco IOS | =15.6\(1\)s | |
Cisco IOS | =15.6\(1\)s1 | |
Cisco IOS | =15.6\(1\)s2 | |
Cisco IOS | =15.6\(1\)s3 | |
Cisco IOS | =15.6\(1\)s4 | |
Cisco IOS | =15.6\(1\)sn | |
Cisco IOS | =15.6\(1\)sn1 | |
Cisco IOS | =15.6\(1\)sn2 | |
Cisco IOS | =15.6\(1\)sn3 | |
Cisco IOS | =15.6\(1\)t | |
Cisco IOS | =15.6\(1\)t0a | |
Cisco IOS | =15.6\(1\)t1 | |
Cisco IOS | =15.6\(1\)t2 | |
Cisco IOS | =15.6\(2\)s | |
Cisco IOS | =15.6\(2\)s1 | |
Cisco IOS | =15.6\(2\)s2 | |
Cisco IOS | =15.6\(2\)s3 | |
Cisco IOS | =15.6\(2\)s4 | |
Cisco IOS | =15.6\(2\)sn | |
Cisco IOS | =15.6\(2\)sp3b | |
Cisco IOS | =15.6\(2\)t | |
Cisco IOS | =15.6\(2\)t0a | |
Cisco IOS | =15.6\(2\)t1 | |
Cisco IOS | =15.6\(2\)t2 | |
Cisco IOS | =15.6\(3\)m | |
Cisco IOS | =15.6\(3\)m0a | |
Cisco IOS | =15.6\(3\)m1 | |
Cisco IOS | =15.6\(3\)m1a | |
Cisco IOS | =15.6\(3\)m1b | |
Cisco IOS | =15.6\(3\)sn | |
Cisco IOS | =15.6\(4\)sn | |
Cisco IOS | =15.6\(5\)sn | |
Cisco IOS | =15.6\(6\)sn | |
Cisco IOS | =15.6\(7\)sn | |
Cisco IOS XE Software | =3.2.0ja | |
Cisco IOS XE Software | =3.16.0as | |
Cisco IOS XE Software | =3.16.0bs | |
Cisco IOS XE Software | =3.16.0cs | |
Cisco IOS XE Software | =3.16.0s | |
Cisco IOS XE Software | =3.16.1as | |
Cisco IOS XE Software | =3.16.1s | |
Cisco IOS XE Software | =3.16.2as | |
Cisco IOS XE Software | =3.16.2bs | |
Cisco IOS XE Software | =3.16.2s | |
Cisco IOS XE Software | =3.16.3as | |
Cisco IOS XE Software | =3.16.3s | |
Cisco IOS XE Software | =3.16.4as | |
Cisco IOS XE Software | =3.16.4bs | |
Cisco IOS XE Software | =3.16.4cs | |
Cisco IOS XE Software | =3.16.4ds | |
Cisco IOS XE Software | =3.16.4es | |
Cisco IOS XE Software | =3.16.4gs | |
Cisco IOS XE Software | =3.16.4s | |
Cisco IOS XE Software | =3.16.5as | |
Cisco IOS XE Software | =3.16.5s | |
Cisco IOS XE Software | =3.17.0s | |
Cisco IOS XE Software | =3.17.1as | |
Cisco IOS XE Software | =3.17.1s | |
Cisco IOS XE Software | =3.17.3s | |
Cisco IOS XE Software | =3.17.4s | |
Cisco IOS XE Software | =3.18.0as | |
Cisco IOS XE Software | =3.18.0s | |
Cisco IOS XE Software | =3.18.0sp | |
Cisco IOS XE Software | =3.18.1asp | |
Cisco IOS XE Software | =3.18.1bsp | |
Cisco IOS XE Software | =3.18.1csp | |
Cisco IOS XE Software | =3.18.1gsp | |
Cisco IOS XE Software | =3.18.1hsp | |
Cisco IOS XE Software | =3.18.1isp | |
Cisco IOS XE Software | =3.18.1s | |
Cisco IOS XE Software | =3.18.1sp | |
Cisco IOS XE Software | =3.18.2asp | |
Cisco IOS XE Software | =3.18.2s | |
Cisco IOS XE Software | =3.18.2sp | |
Cisco IOS XE Software | =3.18.3s | |
Cisco IOS XE Software | =3.18.4s | |
Cisco IOS XE Software | =16.2.1 | |
Cisco IOS XE Software | =16.2.2 | |
Cisco IOS XE Software | =16.3.1 | |
Cisco IOS XE Software | =16.3.1a | |
Cisco IOS XE Software | =16.3.2 | |
Cisco IOS XE Software | =16.3.3 | |
Cisco IOS XE Software | =16.3.4 | |
Cisco IOS XE Software | =16.4.1 | |
Cisco IOS XE Software | =16.4.2 | |
Cisco IOS XE Software | =16.4.3 | |
Cisco IOS XE Software | =16.5.1 | |
Cisco IOS XE Software | =16.5.1a | |
Cisco IOS XE Software | =16.5.1b | |
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-1739 is rated as high due to the potential for unauthenticated remote attackers to cause device reloads.
To fix CVE-2019-1739, upgrade to the applicable software versions released by Cisco which address the vulnerability.
CVE-2019-1739 affects various versions of Cisco IOS and Cisco IOS XE Software, specifically versions 15.1 and newer.
CVE-2019-1739 can be exploited through crafted DNS packets that trigger a parsing issue leading to a device reload.
Workarounds for CVE-2019-1739 include disabling the Network-Based Application Recognition feature on affected devices.