First published: Wed Mar 24 2021(Updated: )
A vulnerability in the Cisco IOx Application Framework of Cisco 809 Industrial Integrated Services Routers (Industrial ISRs), Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. This vulnerability is due to insufficient error handling during packet processing. An attacker could exploit this vulnerability by sending a high and sustained rate of crafted TCP traffic to the IOx web server on an affected device. A successful exploit could allow the attacker to cause the IOx web server to stop processing requests, resulting in a DoS condition. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iox-dos-4Fgcjh6
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOx Application Framework | ||
Cisco 809 Industrial Integrated Services Router Firmware | ||
Cisco 829 Industrial Integrated Services Router Firmware | ||
Cisco CGR 1000 | ||
Cisco IC3000 Industrial Compute Gateway firmware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The cisco-sa-iox-dos-4Fgcjh6 vulnerability has been classified as high severity, as it allows remote attackers to exploit the affected devices.
To mitigate the cisco-sa-iox-dos-4Fgcjh6 vulnerability, it is recommended to update the affected Cisco devices to the latest firmware version provided by Cisco.
The cisco-sa-iox-dos-4Fgcjh6 vulnerability impacts Cisco 809 Industrial Integrated Services Routers, Cisco 829 Industrial ISRs, Cisco CGR 1000 Compute Module, and Cisco IC3000 Industrial Compute Gateway.
Yes, the cisco-sa-iox-dos-4Fgcjh6 vulnerability can be exploited by unauthenticated remote attackers.
Currently, there are no specific workarounds to mitigate the effects of the cisco-sa-iox-dos-4Fgcjh6 vulnerability, and applying updates is the best course of action.