First published: Wed Mar 27 2019(Updated: )
A vulnerability in the Network Address Translation 64 (NAT64) functions of Cisco IOS Software could allow an unauthenticated, remote attacker to cause either an interface queue wedge or a device reload. The vulnerability is due to the incorrect handling of certain IPv4 packet streams that are sent through the device. An attacker could exploit this vulnerability by sending specific IPv4 packet streams through the device. An exploit could allow the attacker to either cause an interface queue wedge or a device reload, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190327-nat64 This advisory is part of the March 27, 2019, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 17 Cisco Security Advisories that describe 19 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: March 2019 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Affected Software | Affected Version | How to fix |
---|---|---|
Puppet Cisco IOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity level of cisco-sa-20190327-nat64 is classified as high due to the potential for an unauthenticated remote attacker to disrupt device functionality.
To fix cisco-sa-20190327-nat64, Cisco recommends applying the appropriate software updates or patches for affected versions of Cisco IOS Software.
The impact of cisco-sa-20190327-nat64 includes possible interface queue wedges or unexpected device reloads, affecting network stability.
Cisco IOS Software running on compatible devices is affected by cisco-sa-20190327-nat64 vulnerability.
No, authentication is not required to exploit cisco-sa-20190327-nat64, allowing remote attackers to target the vulnerability.