First published: Wed Jan 22 2020(Updated: )
A vulnerability in the implementation of the Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of a BGP update message that contains a specific BGP attribute. An attacker could exploit this vulnerability by sending BGP update messages that include a specific, malformed attribute to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer or would need to be injected by the attacker into the victim’s BGP network on an existing, valid TCP connection to a BGP peer. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20200122-ios-xr-bgp-dos
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 | =7.0.1<XRV9K=7.0.1<NCS5500=7.0.1<NCS560=7.0.1<NCS540L=7.0.1<NCS540=7.0.1<NCS6K=7.0.1<NCS5K=7.0.1<NCS1K=7.0.1<ASR9K-X64=6.6.25<NCS5500=6.6.25<NCS560=6.6.25<NCS540L=6.6.25<NCS540=6.6.2<XRV9K>=6.6.2<=6.6.2<NCS5K=6.6.2<ASR9K-X64=6.6.2<ASR9K=6.6.1<NCS6K=6.6.1<NCS540=6.6.1<ASR9K-X64=6.6.1<NCS5500 | XRV9K NCS5500 NCS560 NCS540L NCS540 NCS6K NCS5K NCS1K ASR9K-X64 NCS5500 NCS560 NCS540L NCS540 XRV9K NCS5K ASR9K-X64 ASR9K NCS6K NCS540 ASR9K-X64 NCS5500 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-20200122-ios-xr-bgp-dos is classified as high due to its potential to cause a denial of service.
To fix cisco-sa-20200122-ios-xr-bgp-dos, update the affected Cisco IOS XR Software to a version that addresses this vulnerability.
Systems affected by cisco-sa-20200122-ios-xr-bgp-dos include various models of Cisco IOS XR routers such as ASR9K, NCS540, and NCS5500.
The cisco-sa-20200122-ios-xr-bgp-dos vulnerability enables an unauthenticated remote attacker to launch a denial of service (DoS) attack.
There are no specific workarounds documented for cisco-sa-20200122-ios-xr-bgp-dos, so applying the software update is recommended.