First published: Thu May 16 2019(Updated: )
A vulnerability in the Multiprotocol Label Switching (MPLS) Operations, Administration, and Maintenance (OAM) implementation of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to the incorrect handling of certain MPLS OAM packets. An attacker could exploit this vulnerability by sending malicious MPLS OAM packets to an affected device. A successful exploit could allow the attacker to cause the lspv_server process to crash. The crash could lead to system instability and the inability to process or forward traffic though the device, resulting in a DoS condition that require manual intervention to restore normal operating conditions.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR | =5.3.3-sp10 | |
Cisco Asr 9000v | ||
Cisco Asr 9001 | ||
Cisco Asr 9006 | ||
Cisco Asr 9010 | ||
Cisco Asr 9901 | ||
Cisco Asr 9904 | ||
Cisco Asr 9906 | ||
Cisco Asr 9910 | ||
Cisco Asr 9912 | ||
Cisco Asr 9922 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-1846 is a vulnerability in the Multiprotocol Label Switching (MPLS) Operations Administration and Maintenance (OAM) implementation of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers.
The severity of CVE-2019-1846 is high with a CVSS score of 7.4.
An unauthenticated, adjacent attacker can trigger a denial of service (DoS) condition by exploiting CVE-2019-1846.
Cisco routers ASR 9000 Series Aggregation Services Routers running Cisco IOS XR Software version 5.3.3-sp10 are affected by CVE-2019-1846.
To fix CVE-2019-1846, Cisco advises updating to a fixed version of Cisco IOS XR Software.