Vulnerability Name:

CVE-2019-12652 (CCN-167588)

Assigned:2019-09-25
Published:2019-09-25
Updated:2020-10-08
Summary:A vulnerability in the ingress packet processing function of Cisco IOS Software for Cisco Catalyst 4000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when processing TCP packets directed to the device on specific Cisco Catalyst 4000 Series Switches. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device. A successful exploit could cause the affected device to run out of buffer resources, impairing operations of control plane and management plane protocols, resulting in a DoS condition. This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
8.6 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
7.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2019-12652

Source: XF
Type: UNKNOWN
cisco-cve201912652-dos(167588)

Source: CCN
Type: Cisco Security Advisory cisco-sa-20190925-cat4000-tcp-dos
Cisco Catalyst 4000 Series Switches TCP Denial of Service Vulnerability

Source: CISCO
Type: Vendor Advisory
20190925 Cisco Catalyst 4000 Series Switches TCP Denial of Service Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios:15.2(3)e1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(4)e3:*:*:*:*:*:*:*
  • AND
  • cpe:/h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_4900m:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_4948e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_4948e-f:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:cisco:ios_software:*:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_4500_supervisor_engine_6-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_4500_supervisor_engine_6l-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_4900m_switch_(k5):-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_4948e_ethernet_switch_(k5):-:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco ios 15.2(3)e1
    cisco ios 15.2(4)e3
    cisco catalyst 4500 supervisor engine 6-e -
    cisco catalyst 4500 supervisor engine 6l-e -
    cisco catalyst 4900m -
    cisco catalyst 4948e -
    cisco catalyst 4948e-f -
    cisco ios software *
    cisco catalyst 4500 supervisor engine 6-e -
    cisco catalyst 4500 supervisor engine 6l-e -
    cisco catalyst 4900m switch (k5) -
    cisco catalyst 4948e ethernet switch (k5) -