First published: Thu Mar 28 2019(Updated: )
A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition.
Credit: ykramarz@cisco.com ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.4\(1\)cg1 | |
Cisco IOS | =15.4\(1\)t | |
Cisco IOS | =15.4\(1\)t1 | |
Cisco IOS | =15.4\(1\)t2 | |
Cisco IOS | =15.4\(1\)t3 | |
Cisco IOS | =15.4\(1\)t4 | |
Cisco IOS | =15.4\(2\)t | |
Cisco IOS | =15.4\(2\)t1 | |
Cisco IOS | =15.4\(2\)t2 | |
Cisco IOS | =15.4\(2\)t3 | |
Cisco IOS | =15.4\(2\)t4 | |
Cisco IOS | =15.4\(3\)m | |
Cisco IOS | =15.4\(3\)m1 | |
Cisco IOS | =15.4\(3\)m2 | |
Cisco IOS | =15.4\(3\)m3 | |
Cisco IOS | =15.4\(3\)m4 | |
Cisco IOS | =15.4\(3\)m5 | |
Cisco IOS | =15.4\(3\)m6 | |
Cisco IOS | =15.4\(3\)m6a | |
Cisco IOS | =15.4\(3\)m7 | |
Cisco IOS | =15.4\(3\)m7a | |
Cisco IOS | =15.4\(3\)m8 | |
Cisco IOS | =15.4\(3\)m9 | |
Cisco IOS | =15.4\(3\)m10 | |
Cisco IOS | =15.5\(1\)t | |
Cisco IOS | =15.5\(1\)t1 | |
Cisco IOS | =15.5\(1\)t2 | |
Cisco IOS | =15.5\(1\)t3 | |
Cisco IOS | =15.5\(1\)t4 | |
Cisco IOS | =15.5\(2\)t | |
Cisco IOS | =15.5\(2\)t1 | |
Cisco IOS | =15.5\(2\)t2 | |
Cisco IOS | =15.5\(2\)t3 | |
Cisco IOS | =15.5\(2\)t4 | |
Cisco IOS | =15.5\(2\)xb | |
Cisco IOS | =15.5\(3\)m | |
Cisco IOS | =15.5\(3\)m0a | |
Cisco IOS | =15.5\(3\)m1 | |
Cisco IOS | =15.5\(3\)m2 | |
Cisco IOS | =15.5\(3\)m2a | |
Cisco IOS | =15.5\(3\)m3 | |
Cisco IOS | =15.5\(3\)m4 | |
Cisco IOS | =15.5\(3\)m4a | |
Cisco IOS | =15.5\(3\)m4b | |
Cisco IOS | =15.5\(3\)m4c | |
Cisco IOS | =15.5\(3\)m5 | |
Cisco IOS | =15.5\(3\)m5a | |
Cisco IOS | =15.5\(3\)m6 | |
Cisco IOS | =15.5\(3\)m6a | |
Cisco IOS | =15.5\(3\)m7 | |
Cisco IOS | =15.5\(3\)m8 | |
Cisco IOS | =15.6\(1\)t | |
Cisco IOS | =15.6\(1\)t0a | |
Cisco IOS | =15.6\(1\)t1 | |
Cisco IOS | =15.6\(1\)t2 | |
Cisco IOS | =15.6\(1\)t3 | |
Cisco IOS | =15.6\(2\)t | |
Cisco IOS | =15.6\(2\)t0a | |
Cisco IOS | =15.6\(2\)t1 | |
Cisco IOS | =15.6\(2\)t2 | |
Cisco IOS | =15.6\(2\)t3 | |
Cisco IOS | =15.6\(3\)m | |
Cisco IOS | =15.6\(3\)m0a | |
Cisco IOS | =15.6\(3\)m1 | |
Cisco IOS | =15.6\(3\)m1a | |
Cisco IOS | =15.6\(3\)m1b | |
Cisco IOS | =15.6\(3\)m2 | |
Cisco IOS | =15.6\(3\)m2a | |
Cisco IOS | =15.6\(3\)m3 | |
Cisco IOS | =15.6\(3\)m3a | |
Cisco IOS | =15.6\(3\)m4 | |
Cisco IOS | =15.6\(3\)m5 | |
Cisco IOS | =15.7\(3\)m | |
Cisco IOS | =15.7\(3\)m0a | |
Cisco IOS | =15.7\(3\)m1 | |
Cisco IOS | =15.7\(3\)m2 | |
Cisco IOS | =15.7\(3\)m3 | |
Cisco IOS | =15.8\(3\)m | |
Cisco IOS | =15.8\(3\)m0a | |
Cisco IOS | =15.8\(3\)m0b | |
=15.4\(1\)cg1 | ||
=15.4\(1\)t | ||
=15.4\(1\)t1 | ||
=15.4\(1\)t2 | ||
=15.4\(1\)t3 | ||
=15.4\(1\)t4 | ||
=15.4\(2\)t | ||
=15.4\(2\)t1 | ||
=15.4\(2\)t2 | ||
=15.4\(2\)t3 | ||
=15.4\(2\)t4 | ||
=15.4\(3\)m | ||
=15.4\(3\)m1 | ||
=15.4\(3\)m2 | ||
=15.4\(3\)m3 | ||
=15.4\(3\)m4 | ||
=15.4\(3\)m5 | ||
=15.4\(3\)m6 | ||
=15.4\(3\)m6a | ||
=15.4\(3\)m7 | ||
=15.4\(3\)m7a | ||
=15.4\(3\)m8 | ||
=15.4\(3\)m9 | ||
=15.4\(3\)m10 | ||
=15.5\(1\)t | ||
=15.5\(1\)t1 | ||
=15.5\(1\)t2 | ||
=15.5\(1\)t3 | ||
=15.5\(1\)t4 | ||
=15.5\(2\)t | ||
=15.5\(2\)t1 | ||
=15.5\(2\)t2 | ||
=15.5\(2\)t3 | ||
=15.5\(2\)t4 | ||
=15.5\(2\)xb | ||
=15.5\(3\)m | ||
=15.5\(3\)m0a | ||
=15.5\(3\)m1 | ||
=15.5\(3\)m2 | ||
=15.5\(3\)m2a | ||
=15.5\(3\)m3 | ||
=15.5\(3\)m4 | ||
=15.5\(3\)m4a | ||
=15.5\(3\)m4b | ||
=15.5\(3\)m4c | ||
=15.5\(3\)m5 | ||
=15.5\(3\)m5a | ||
=15.5\(3\)m6 | ||
=15.5\(3\)m6a | ||
=15.5\(3\)m7 | ||
=15.5\(3\)m8 | ||
=15.6\(1\)t | ||
=15.6\(1\)t0a | ||
=15.6\(1\)t1 | ||
=15.6\(1\)t2 | ||
=15.6\(1\)t3 | ||
=15.6\(2\)t | ||
=15.6\(2\)t0a | ||
=15.6\(2\)t1 | ||
=15.6\(2\)t2 | ||
=15.6\(2\)t3 | ||
=15.6\(3\)m | ||
=15.6\(3\)m0a | ||
=15.6\(3\)m1 | ||
=15.6\(3\)m1a | ||
=15.6\(3\)m1b | ||
=15.6\(3\)m2 | ||
=15.6\(3\)m2a | ||
=15.6\(3\)m3 | ||
=15.6\(3\)m3a | ||
=15.6\(3\)m4 | ||
=15.6\(3\)m5 | ||
=15.7\(3\)m | ||
=15.7\(3\)m0a | ||
=15.7\(3\)m1 | ||
=15.7\(3\)m2 | ||
=15.7\(3\)m3 | ||
=15.8\(3\)m | ||
=15.8\(3\)m0a | ||
=15.8\(3\)m0b |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1751 has a high severity rating due to its potential to allow unauthorized remote access and device instability.
To fix CVE-2019-1751, update the Cisco IOS Software to a version that is not affected by this vulnerability.
CVE-2019-1751 affects various versions of Cisco IOS, including 15.4(1)cg1, 15.4(1)t, and multiple 15.4 and 15.5 series versions.
Yes, CVE-2019-1751 is exploitable by an unauthenticated remote attacker.
CVE-2019-1751 can lead to a device reload or create a condition that wedges the interface queue, disrupting network services.