First published: Wed Sep 28 2022(Updated: )
A vulnerability in the egress MPLS packet processing function of Cisco IOS XE Software for Cisco Catalyst 3650, Catalyst 3850, and Catalyst 9000 Family Switches could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition. This vulnerability is due to insufficient input validation of IPv4 traffic. An attacker could exploit this vulnerability by sending a malformed packet out of an affected MPLS-enabled interface. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-mpls-dos-Ab4OUL3 This advisory is part of the September 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software | ||
Cisco Catalyst 3650 Series | ||
Cisco Catalyst 3850 Series | ||
Cisco Catalyst 9000 Family Switches |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxe-mpls-dos-Ab4OUL3 is rated high due to its potential to cause denial of service on affected devices.
To fix cisco-sa-iosxe-mpls-dos-Ab4OUL3, you should apply the appropriate software patches or updates provided by Cisco.
The devices affected by cisco-sa-iosxe-mpls-dos-Ab4OUL3 include Cisco Catalyst 3650, Catalyst 3850, and Catalyst 9000 Family Switches.
cisco-sa-iosxe-mpls-dos-Ab4OUL3 involves a denial of service attack that can cause affected devices to unexpectedly reload.
No authentication is required to exploit cisco-sa-iosxe-mpls-dos-Ab4OUL3, making it particularly concerning.