First published: Mon Aug 17 2020(Updated: )
A vulnerability in the IPv6 implementation of Cisco StarOS could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient validation of incoming IPv6 traffic. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to an affected device with the goal of reaching the vulnerable section of the input buffer. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. This vulnerability is specific to IPv6 traffic. IPv4 traffic is not affected.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco StarOS | <21.18.3 | |
Cisco Virtualized Packet Core-single Instance | ||
Cisco ASR 5500 | ||
Cisco Asr 5700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Cisco StarOS vulnerability is CVE-2020-3500.
The severity of CVE-2020-3500 is high with a CVSS score of 8.6.
The affected software for CVE-2020-3500 includes Cisco StarOS versions up to and excluding 21.18.3.
CVE-2020-3500 can allow an unauthenticated remote attacker to cause a denial of service (DoS) condition on an affected device.
Cisco has released a security advisory with mitigation details and software updates to address the vulnerability. Please refer to the Cisco Security Advisory for more information.