Vulnerability Name:

CVE-2019-12663 (CCN-167591)

Assigned:2019-09-25
Published:2019-09-25
Updated:2019-10-09
Summary:A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.
CVSS v3 Severity:8.6 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
7.5 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H)
5.9 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2019-12663

Source: XF
Type: UNKNOWN
cisco-cve201912663-dos(167591)

Source: CCN
Type: Cisco Security Advisory cisco-sa-20190925-ctspac-dos
Cisco IOS XE Software TrustSec Protected Access Credential Provisioning Denial of Service Vulnerability

Source: CISCO
Type: Vendor Advisory
20190925 Cisco IOS XE Software TrustSec Protected Access Credential Provisioning Denial of Service Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:*
  • AND
  • cpe:/h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48s-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48t-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48t-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48u-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48u-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48un-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48un-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48uxm-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300-48uxm-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-24p-4g-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-24p-4g-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-24p-4x-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-24p-4x-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-24t-4g-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-24t-4g-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-24t-4x-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-24t-4x-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-48p-4g-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-48p-4g-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-48p-4x-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-48p-4x-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-48t-4g-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-48t-4g-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-48t-4x-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l-48t-4x-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_9300l_stack:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_c9500-12q-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_c9500-12q-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_c9500-16x-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_c9500-16x-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_c9500-24q-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_c9500-24q-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_c9500-40x-a:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_c9500-40x-e:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:cbr-8_converged_broadband_router:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:cisco:ios_xe_software:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco ios xe 16.6.4
    cisco ios xe 16.12.1
    cisco catalyst 9300-24p-a -
    cisco catalyst 9300-24p-e -
    cisco catalyst 9300-24s-a -
    cisco catalyst 9300-24s-e -
    cisco catalyst 9300-24t-a -
    cisco catalyst 9300-24t-e -
    cisco catalyst 9300-24u-a -
    cisco catalyst 9300-24u-e -
    cisco catalyst 9300-24ux-a -
    cisco catalyst 9300-24ux-e -
    cisco catalyst 9300-48p-a -
    cisco catalyst 9300-48p-e -
    cisco catalyst 9300-48s-a -
    cisco catalyst 9300-48s-e -
    cisco catalyst 9300-48t-a -
    cisco catalyst 9300-48t-e -
    cisco catalyst 9300-48u-a -
    cisco catalyst 9300-48u-e -
    cisco catalyst 9300-48un-a -
    cisco catalyst 9300-48un-e -
    cisco catalyst 9300-48uxm-a -
    cisco catalyst 9300-48uxm-e -
    cisco catalyst 9300l-24p-4g-a -
    cisco catalyst 9300l-24p-4g-e -
    cisco catalyst 9300l-24p-4x-a -
    cisco catalyst 9300l-24p-4x-e -
    cisco catalyst 9300l-24t-4g-a -
    cisco catalyst 9300l-24t-4g-e -
    cisco catalyst 9300l-24t-4x-a -
    cisco catalyst 9300l-24t-4x-e -
    cisco catalyst 9300l-48p-4g-a -
    cisco catalyst 9300l-48p-4g-e -
    cisco catalyst 9300l-48p-4x-a -
    cisco catalyst 9300l-48p-4x-e -
    cisco catalyst 9300l-48t-4g-a -
    cisco catalyst 9300l-48t-4g-e -
    cisco catalyst 9300l-48t-4x-a -
    cisco catalyst 9300l-48t-4x-e -
    cisco catalyst 9300l stack -
    cisco catalyst c9500-12q-a -
    cisco catalyst c9500-12q-e -
    cisco catalyst c9500-16x-a -
    cisco catalyst c9500-16x-e -
    cisco catalyst c9500-24q-a -
    cisco catalyst c9500-24q-e -
    cisco catalyst c9500-40x-a -
    cisco catalyst c9500-40x-e -
    cisco cbr-8 converged broadband router -
    cisco ios xe software *