First published: Wed Sep 08 2021(Updated: )
A vulnerability in the IP Service Level Agreements (IP SLA) responder and Two-Way Active Measurement Protocol (TWAMP) features of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause device packet memory to become exhausted or cause the IP SLA process to crash, resulting in a denial of service (DoS) condition. This vulnerability exists because socket creation failures are mishandled during the IP SLA and TWAMP processes. An attacker could exploit this vulnerability by sending specific IP SLA or TWAMP packets to an affected device. A successful exploit could allow the attacker to exhaust the packet memory, which will impact other processes, such as routing protocols, or crash the IP SLA process. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP This advisory is part of the September 2021 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see Cisco Event Response: September 2021 Cisco IOS XR Software Security Advisory Bundled Publication.
Credit: This vulnerability was found during the resolution a Cisco TAC support case
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XR Software | ||
Cisco IOS XR Software | =7.1.3<ASR9K-X64=NCS5500<ncs5500-7.1.2.CSCvw32825=NCS560<ncs560-7.1.2.CSCvw32825=7.1.2<NCS540=6.7.3<ASR9K-PX=NCS5500<ncs5500-6.6.3.CSCvw32825=ASR9K-X64<asr9k-x64-6.6.3.CSCvw32825=6.6.3<ASR9K-PX=6.5.3<ASR9K-PX=6.4.2<ASR9K-X64=6.3.3<ASR9K-PX | ASR9K-X64 ncs5500-7.1.2.CSCvw32825 ncs560-7.1.2.CSCvw32825 NCS540 ASR9K-PX ncs5500-6.6.3.CSCvw32825 asr9k-x64-6.6.3.CSCvw32825 ASR9K-PX ASR9K-PX ASR9K-X64 ASR9K-PX |
Cisco IOS XR Software | =7.1.3<ASR9K-X64=ASR9K-X64<asr9k-x64-6.6.3.CSCvw61840=6.6.3<ASR9K-PX=6.5.3<NCS5500=6.3.3<ASR9K-PX | ASR9K-X64 asr9k-x64-6.6.3.CSCvw61840 ASR9K-PX NCS5500 ASR9K-PX |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is cisco-sa-ipsla-ZA3SRrpP.
The severity of cisco-sa-ipsla-ZA3SRrpP is high.
Cisco IOS XR Software is affected by cisco-sa-ipsla-ZA3SRrpP.
An unauthenticated, remote attacker can cause device packet memory exhaustion or crash the IP SLA process.
Please refer to the Cisco Security Advisory for the available remedies.