First published: Thu Sep 24 2020(Updated: )
A vulnerability in the Umbrella Connector component of Cisco IOS XE Software for Cisco Catalyst 9200 Series Switches could allow an unauthenticated, remote attacker to trigger a reload, resulting in a denial of service condition on an affected device. The vulnerability is due to insufficient error handling when parsing DNS requests. An attacker could exploit this vulnerability by sending a series of malicious DNS requests to an Umbrella Connector client interface of an affected device. A successful exploit could allow the attacker to cause a crash of the iosd process, which triggers a reload of the affected device. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-umbrella-dos-t2QMUX37 This advisory is part of the September 24, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 34 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication.
Credit: This vulnerability was found by Priyanka Bansal Cisco during internal security testing
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Software | ||
Cisco Catalyst 9200 Series |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of cisco-sa-iosxe-umbrella-dos-t2QMUX37 is classified as high due to its potential to cause a denial of service.
To fix cisco-sa-iosxe-umbrella-dos-t2QMUX37, apply the recommended software updates provided by Cisco for affected devices.
cisco-sa-iosxe-umbrella-dos-t2QMUX37 impacts Cisco IOS XE Software on Cisco Catalyst 9200 Series Switches.
Yes, cisco-sa-iosxe-umbrella-dos-t2QMUX37 can be exploited remotely by an unauthenticated attacker.
The impact of cisco-sa-iosxe-umbrella-dos-t2QMUX37 is a denial of service condition that can cause the device to reload.