First published: Wed Sep 22 2021(Updated: )
A vulnerability in the H.323 application level gateway (ALG) used by the Network Address Translation (NAT) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass the ALG. This vulnerability is due to insufficient data validation of traffic that is traversing the ALG. An attacker could exploit this vulnerability by sending crafted traffic to a targeted device. A successful exploit could allow the attacker to bypass the ALG and open connections that should not be allowed to a remote device located behind the ALG. Note: This vulnerability has been publicly discussed as NAT Slipstreaming. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q This advisory is part of the September 2021 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: Cisco was made aware this vulnerability through public discussion of the NAT Slipstreaming attacks
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q is considered high due to its potential to allow unauthenticated remote access.
To fix cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q, upgrade to the recommended version of Cisco IOS XE Software that addresses this vulnerability.
Users of Cisco IOS XE Software utilizing the H.323 application level gateway feature are affected by cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q.
cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q is caused by insufficient data validation of traffic processed by the H.323 ALG in Cisco IOS XE Software.
The potential impacts of cisco-sa-iosxe-h323alg-bypass-4vy2MP2Q include unauthorized access and manipulation of network traffic by an attacker.