A vulnerability in the Multiprotocol Label Switching (MPLS) Operations, Administration, and Maintenance (OAM) implementation of Cisco IOS XR Software for Cisco ASR 9000 Series Aggregation Services Routers could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to the incorrect handling of certain MPLS OAM packets. An attacker could exploit this vulnerability by sending malicious MPLS OAM packets to an affected device. A successful exploit could allow the attacker to cause the lspv_server process to crash. The crash could lead to system instability and the inability to process or forward traffic though the device, resulting in a DoS condition that require manual intervention to restore normal operating conditions.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/108363 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-asr9k-mpls-dos | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-05-16 02:29
Updated : 2024-02-04 20:20
NVD link : CVE-2019-1846
Mitre link : CVE-2019-1846
CVE.ORG link : CVE-2019-1846
JSON object : View
Products Affected
cisco
- asr_9000v
- ios_xr
- asr_9910
- asr_9006
- asr_9001
- asr_9922
- asr_9901
- asr_9010
- asr_9912
- asr_9904
- asr_9906
CWE
CWE-20
Improper Input Validation