CVE-2019-12653

A vulnerability in the Raw Socket Transport feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper parsing of Raw Socket Transport payloads. An attacker could exploit this vulnerability by establishing a TCP session and then sending a malicious TCP segment via IPv4 to an affected device. This cannot be exploited via IPv6, as the Raw Socket Transport feature does not support IPv6 as a network layer protocol.
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:ios_xe:16.9:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:16.10.1:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:asr_902:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_902u:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_903:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_907:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_914:-:*:*:*:*:*:*:*

History

No history.

Information

Published : 2019-09-25 21:15

Updated : 2024-02-04 20:39


NVD link : CVE-2019-12653

Mitre link : CVE-2019-12653

CVE.ORG link : CVE-2019-12653


JSON object : View

Products Affected

cisco

  • asr_914
  • asr_902u
  • ios_xe
  • asr_903
  • asr_902
  • asr_907
CWE
CWE-20

Improper Input Validation