First published: Wed Sep 11 2024(Updated: )
A vulnerability in the Dedicated XML Agent feature of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) on XML TCP listen port 38751.This vulnerability is due to a lack of proper error validation of ingress XML packets. An
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XRv 9000 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S vulnerability is classified as a denial of service (DoS) risk, which can significantly impact system availability.
To remediate cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S, update the Cisco IOS XR Software to the latest version that addresses this vulnerability.
Cisco IOS XR Software, particularly versions deployed on Cisco IOS XRv 9000, are susceptible to the cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S vulnerability.
The cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S vulnerability allows an unauthenticated, remote attacker to cause a denial of service on the XML TCP listen port 38751.
No, exploitation of the cisco-sa-iosxr-xml-tcpdos-ZEXvrU2S vulnerability does not require authentication, making it particularly dangerous.