First published: Wed Apr 13 2022(Updated: )
A vulnerability in the implementation of the Resource Public Key Infrastructure (RPKI) feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the Border Gateway Protocol (BGP) process to crash, resulting in a denial of service (DoS) condition. This vulnerability is due to the incorrect handling of a specific RPKI to Router (RTR) Protocol packet header. An attacker could exploit this vulnerability by compromising the RPKI validator server and sending a specifically crafted RTR packet to an affected device. Alternatively, the attacker could use man-in-the-middle techniques to impersonate the RPKI validator server and send a crafted RTR response packet over the established RTR TCP connection to the affected device. A successful exploit could allow the attacker to cause a DoS condition because the BGP process could constantly restart and BGP routing could become unstable. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-rpki-dos-2EgCNeKE This advisory is part of the April 2022 release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: April 2022 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: This vulnerability was reported to the Cisco PSIRT for resolution by the U.S. National Security Agency (NSA).
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS and IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxe-rpki-dos-2EgCNeKE is high due to potential denial of service conditions.
To fix cisco-sa-iosxe-rpki-dos-2EgCNeKE, update to a Cisco IOS XE Software version that includes the security patch.
The impact of cisco-sa-iosxe-rpki-dos-2EgCNeKE can result in crashing the BGP process, leading to a denial of service.
Cisco IOS XE Software users utilizing the RPKI feature are affected by cisco-sa-iosxe-rpki-dos-2EgCNeKE.
Yes, cisco-sa-iosxe-rpki-dos-2EgCNeKE is exploitable by unauthenticated remote attackers.