First published: Wed Apr 05 2023(Updated: )
A vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) could allow an unauthenticated, remote attacker to stop ICMP traffic from being processed over an IPsec connection. This vulnerability is due to the VPP improperly handling a malformed packet. An attacker could exploit this vulnerability by sending a malformed Encapsulating Security Payload (ESP) packet over an IPsec connection. A successful exploit could allow the attacker to stop ICMP traffic over an IPsec connection and cause a denial of service (DoS).
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Packet Data Network Gateway | <21.28.0 | |
Cisco ASR 5000 | ||
Cisco ASR 5500 | ||
Cisco Asr 5700 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20051 is a vulnerability in the Vector Packet Processor (VPP) of Cisco Packet Data Network Gateway (PGW) that could allow an unauthenticated, remote attacker to stop ICMP traffic from being processed over an IPsec connection.
The severity of CVE-2023-20051 is high, with a severity value of 7.5.
The Cisco Packet Data Network Gateway (PGW) version up to 21.28.0 is affected by CVE-2023-20051.
The Cisco ASR 5000 is a network router that is not vulnerable to CVE-2023-20051.
The Cisco ASR 5500 is a network router that is not vulnerable to CVE-2023-20051.