First published: Thu Jun 20 2019(Updated: )
A vulnerability in the internal packet-processing functionality of the Cisco StarOS operating system running on virtual platforms could allow an unauthenticated, remote attacker to cause an affected device to stop processing traffic, resulting in a denial of service (DoS) condition. The vulnerability is due to a logic error that may occur under specific traffic conditions. An attacker could exploit this vulnerability by sending a series of crafted packets to an affected device. A successful exploit could allow the attacker to prevent the targeted service interface from receiving any traffic, which would lead to a DoS condition on the affected interface. The device may have to be manually reloaded to recover from exploitation of this vulnerability.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco StarOS | >=21.6<21.6.13 | |
Cisco StarOS | >=21.6b<21.6b.16 | |
Cisco StarOS | >=21.7<21.7.11 | |
Cisco StarOS | >=21.8<21.8.10 | |
Cisco StarOS | >=21.9<21.9.7 | |
Cisco StarOS | >=21.10<21.10.2 | |
Cisco StarOS | >=21.11<21.11.1 | |
Cisco ASR 5000 | ||
Cisco ASR 5500 | ||
Cisco Asr 5700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability CVE-2019-1869 is a denial of service (DoS) vulnerability in the Cisco StarOS operating system.
The vulnerability CVE-2019-1869 can allow an unauthenticated, remote attacker to cause an affected device running Cisco StarOS to stop processing traffic, resulting in a denial of service (DoS) condition.
The severity of the vulnerability CVE-2019-1869 is high, with a severity value of 7.5.
The vulnerability CVE-2019-1869 affects Cisco StarOS versions between 21.6 and 21.11.
To fix the vulnerability CVE-2019-1869, Cisco recommends upgrading to a fixed software release.