First published: Wed Jun 03 2020(Updated: )
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to insufficient input processing of CIP traffic. An attacker could exploit these vulnerabilities by sending crafted CIP traffic to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-cipdos-hkfTZXEx This advisory is part of the June 3, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 23 Cisco Security Advisories that describe 25 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: June 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: These vulnerabilities were found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | ||
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of the vulnerability cisco-sa-cipdos-hkfTZXEx is critical due to the potential for unauthenticated remote attackers to cause a denial of service.
To fix cisco-sa-cipdos-hkfTZXEx, update your Cisco IOS Software or Cisco IOS XE Software to the latest version that includes the necessary patches.
Cisco IOS and Cisco IOS XE Software devices with the Common Industrial Protocol (CIP) feature are affected by cisco-sa-cipdos-hkfTZXEx.
The impact of cisco-sa-cipdos-hkfTZXEx is that it can cause affected network devices to reload, resulting in a denial of service condition.
No, authentication is not required to exploit the vulnerability cisco-sa-cipdos-hkfTZXEx, making it particularly hazardous.