First published: Wed Jun 03 2020(Updated: )
A vulnerability in the Simple Network Management Protocol (SNMP) implementation in Cisco ASR 920 Series Aggregation Services Router model ASR920-12SZ-IM could allow an authenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of data that is returned for Cisco Discovery Protocol queries to SNMP. An attacker could exploit this vulnerability by sending a request for Cisco Discovery Protocol information by using SNMP. An exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. Cisco has released software updates that address this vulnerability. There are workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asr920-ABjcLmef
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco ASR 920 Series Router |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-asr920-ABjcLmef is rated as high due to the potential for an attacker to cause the device to reload.
To fix cisco-sa-asr920-ABjcLmef, upgrade the affected Cisco ASR 920 Series Aggregation Services Router to a patched version.
The affected devices include the Cisco ASR 920 Series Aggregation Services Router, specifically the ASR920-12SZ-IM model.
An authenticated remote attacker can exploit the cisco-sa-asr920-ABjcLmef vulnerability to cause the device to reload.
The type of attack associated with cisco-sa-asr920-ABjcLmef involves improper handling of SNMP requests leading to device reload.