First published: Wed Aug 07 2019(Updated: )
A vulnerability in the implementation of the Intermediate System-to-Intermediate System (IS-IS) routing protocol functionality in Cisco IOS XR Software could allow an unauthenticated attacker who is in the same IS-IS area to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of crafted IS-IS link-state protocol data units (PDUs). An attacker could exploit this vulnerability by sending a crafted link-state PDU to an affected system to be processed. A successful exploit could allow the attacker to cause all routers within the IS-IS area to unexpectedly restart the IS-IS process, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190807-iosxr-isis-dos-1910
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 | =6.6.1<AA15881=6.5.3<AA15778 | AA15881 AA15778 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20190807-iosxr-isis-dos-1910 is classified as high due to its potential to cause a Denial of Service (DoS) condition.
To fix cisco-sa-20190807-iosxr-isis-dos-1910, upgrade to a fixed software version of Cisco IOS XR that addresses the vulnerability.
Organizations using vulnerable versions of Cisco IOS XR Software that implement IS-IS routing protocol are affected by cisco-sa-20190807-iosxr-isis-dos-1910.
Affected versions of Cisco IOS XR include 6.5.3 and 6.6.1 according to cisco-sa-20190807-iosxr-isis-dos-1910.
Mitigation of cisco-sa-20190807-iosxr-isis-dos-1910 can be achieved by implementing network segmentation to limit access to vulnerable devices.