ID

VAR-201905-0602


CVE

CVE-2019-1849


TITLE

Cisco IOS XR Vulnerability in software checking for exceptional conditions

Trust: 0.8

sources: JVNDB: JVNDB-2019-004586

DESCRIPTION

A vulnerability in the Border Gateway Patrol (BGP) Multiprotocol Label Switching (MPLS)-based Ethernet VPN (EVPN) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a logic error that occurs when the affected software processes specific EVPN routing information. An attacker could exploit this vulnerability by injecting malicious traffic patterns into the targeted EVPN network. A successful exploit could result in a crash of the l2vpn_mgr process on Provider Edge (PE) device members of the same EVPN instance (EVI). On each of the affected devices, a crash could lead to system instability and the inability to process or forward traffic through the device, resulting in a DoS condition that would require manual intervention to restore normal operating conditions. Cisco IOS XR The software contains an exceptional condition check vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOSXR Software is a fully modular, distributed network operating system from Cisco's IOS software family, including IOST, IOSS, and IOSXR. A denial of service vulnerability exists in Cisco IOSXRSoftware that could be exploited by an attacker to cause a denial of service. Cisco IOS XR Software is prone to a denial-of-service vulnerability. An attacker can exploit this issue to crash the process, denying service to legitimate users. This issue is being tracked by Cisco Bug ID CSCvk35997. This vulnerability stems from improper design or implementation problems in the code development process of network systems or products. The following products and versions are affected: Cisco IOS XR 6.1.0 to 6.3.3 (fixed in 6.3.3), 6.4.X prior to 6.4.2, 6.5.X prior to 6.5.2, 6.6. 1 Versions prior to 6.6.X

Trust: 2.52

sources: NVD: CVE-2019-1849 // JVNDB: JVNDB-2019-004586 // CNVD: CNVD-2019-14701 // BID: 108342 // VULHUB: VHN-150841

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2019-14701

AFFECTED PRODUCTS

vendor:ciscomodel:ios xrscope:ltversion:6.4.2

Trust: 1.0

vendor:ciscomodel:ios xrscope:ltversion:6.5.2

Trust: 1.0

vendor:ciscomodel:ios xrscope:gteversion:6.1.0

Trust: 1.0

vendor:ciscomodel:ios xrscope:gteversion:6.5.0

Trust: 1.0

vendor:ciscomodel:ios xrscope:gteversion:6.4.0

Trust: 1.0

vendor:ciscomodel:ios xrscope:ltversion:6.3.3

Trust: 1.0

vendor:ciscomodel:ios xrscope:gteversion:6.6.0

Trust: 1.0

vendor:ciscomodel:ios xrscope:ltversion:6.6.1

Trust: 1.0

vendor:ciscomodel:ios xrscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xr softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:network convergence system series routers 6.6.1.basescope:eqversion:6000

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:6.6

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:6.5

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:6.4

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:6.3

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:eqversion:6.1

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:neversion:6.6.12

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:neversion:6.5.3

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:neversion:6.4.2

Trust: 0.3

vendor:ciscomodel:ios xr softwarescope:neversion:6.3.3

Trust: 0.3

sources: CNVD: CNVD-2019-14701 // BID: 108342 // JVNDB: JVNDB-2019-004586 // NVD: CVE-2019-1849

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2019-1849
value: MEDIUM

Trust: 1.0

ykramarz@cisco.com: CVE-2019-1849
value: HIGH

Trust: 1.0

NVD: CVE-2019-1849
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2019-14701
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201905-702
value: MEDIUM

Trust: 0.6

VULHUB: VHN-150841
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2019-1849
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2019-14701
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-150841
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2019-1849
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

ykramarz@cisco.com: CVE-2019-1849
baseSeverity: HIGH
baseScore: 7.4
vectorString: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 4.0
version: 3.0

Trust: 1.0

sources: CNVD: CNVD-2019-14701 // VULHUB: VHN-150841 // JVNDB: JVNDB-2019-004586 // CNNVD: CNNVD-201905-702 // NVD: CVE-2019-1849 // NVD: CVE-2019-1849

PROBLEMTYPE DATA

problemtype:CWE-754

Trust: 1.9

sources: VULHUB: VHN-150841 // JVNDB: JVNDB-2019-004586 // NVD: CVE-2019-1849

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201905-702

TYPE

code problem

Trust: 0.6

sources: CNNVD: CNNVD-201905-702

CONFIGURATIONS

sources: JVNDB: JVNDB-2019-004586

PATCH

title:cisco-sa-20190515-iosxr-evpn-dosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190515-iosxr-evpn-dos

Trust: 0.8

title:Patch for CiscoIOSXRSoftware Denial of Service Vulnerability (CNVD-2019-14701)url:https://www.cnvd.org.cn/patchInfo/show/161579

Trust: 0.6

title:Cisco IOS XR Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=92826

Trust: 0.6

sources: CNVD: CNVD-2019-14701 // JVNDB: JVNDB-2019-004586 // CNNVD: CNNVD-201905-702

EXTERNAL IDS

db:NVDid:CVE-2019-1849

Trust: 3.4

db:BIDid:108342

Trust: 2.0

db:JVNDBid:JVNDB-2019-004586

Trust: 0.8

db:CNNVDid:CNNVD-201905-702

Trust: 0.7

db:CNVDid:CNVD-2019-14701

Trust: 0.6

db:AUSCERTid:ESB-2019.1779

Trust: 0.6

db:AUSCERTid:ESB-2019.1779.2

Trust: 0.6

db:VULHUBid:VHN-150841

Trust: 0.1

sources: CNVD: CNVD-2019-14701 // VULHUB: VHN-150841 // BID: 108342 // JVNDB: JVNDB-2019-004586 // CNNVD: CNNVD-201905-702 // NVD: CVE-2019-1849

REFERENCES

url:http://www.securityfocus.com/bid/108342

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-iosxr-evpn-dos

Trust: 2.0

url:https://nvd.nist.gov/vuln/detail/cve-2019-1849

Trust: 1.4

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2019-1849

Trust: 0.8

url:https://web.nvd.nist.gov//vuln/detail/cve-2019-1849

Trust: 0.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20190515-iosxr-mpls-dos

Trust: 0.6

url:https://vigilance.fr/vulnerability/cisco-ios-xr-denial-of-service-via-mpls-29319

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1779/

Trust: 0.6

url:https://www.auscert.org.au/bulletins/81202

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2019.1779.2/

Trust: 0.6

sources: CNVD: CNVD-2019-14701 // VULHUB: VHN-150841 // BID: 108342 // JVNDB: JVNDB-2019-004586 // CNNVD: CNNVD-201905-702 // NVD: CVE-2019-1849

CREDITS

Cisco

Trust: 0.9

sources: BID: 108342 // CNNVD: CNNVD-201905-702

SOURCES

db:CNVDid:CNVD-2019-14701
db:VULHUBid:VHN-150841
db:BIDid:108342
db:JVNDBid:JVNDB-2019-004586
db:CNNVDid:CNNVD-201905-702
db:NVDid:CVE-2019-1849

LAST UPDATE DATE

2024-08-14T13:26:29.606000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2019-14701date:2019-05-17T00:00:00
db:VULHUBid:VHN-150841date:2019-10-09T00:00:00
db:BIDid:108342date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004586date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-702date:2019-07-12T00:00:00
db:NVDid:CVE-2019-1849date:2019-10-09T23:48:19.863

SOURCES RELEASE DATE

db:CNVDid:CNVD-2019-14701date:2019-05-17T00:00:00
db:VULHUBid:VHN-150841date:2019-05-16T00:00:00
db:BIDid:108342date:2019-05-15T00:00:00
db:JVNDBid:JVNDB-2019-004586date:2019-06-05T00:00:00
db:CNNVDid:CNNVD-201905-702date:2019-05-15T00:00:00
db:NVDid:CVE-2019-1849date:2019-05-16T02:29:00.497