CWE
345
Advisory Published

cisco-sa-iosxe-vpn-dos-edOmW28Z: Cisco IOS XE Software IPsec VPN Denial of Service Vulnerability

First published: Wed Jun 03 2020(Updated: )

A vulnerability in the hardware crypto driver of Cisco IOS XE Software for Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers could allow an unauthenticated, remote attacker to disconnect legitimate IPsec VPN sessions to an affected device. The vulnerability is due to insufficient verification of authenticity of received Encapsulating Security Payload (ESP) packets. An attacker could exploit this vulnerability by tampering with ESP cleartext values as a man-in-the-middle. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxe-vpn-dos-edOmW28Z

Affected SoftwareAffected VersionHow to fix
Cisco IOS XE
Cisco 4000 Series Integrated Services Routers
Cisco Catalyst 9000 Family Wireless Controllers

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Child vulnerabilities

(Contains the following vulnerabilities)

Frequently Asked Questions

  • What is the severity of Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z?

    The severity of Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z is considered high due to its potential impact on IPsec VPN sessions.

  • How do I fix Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z?

    To fix Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z, upgrade to a patched version of the Cisco IOS XE software as recommended by Cisco.

  • What devices are affected by Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z?

    Devices affected by Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z include Cisco 4300 Series Integrated Services Routers and Cisco Catalyst 9800-L Wireless Controllers.

  • Can Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z be exploited remotely?

    Yes, Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z can be exploited by an unauthenticated remote attacker.

  • What type of attack does Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z facilitate?

    Cisco SA IOS XE VPN DoS vulnerability cisco-sa-iosxe-vpn-dos-edOmW28Z facilitates denial-of-service attacks by disconnecting legitimate IPsec VPN sessions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203