Vulnerability Name:

CVE-2019-1849 (CCN-161063)

Assigned:2018-12-06
Published:2019-05-15
Updated:2019-10-09
Summary:A vulnerability in the Border Gateway Patrol (BGP) Multiprotocol Label Switching (MPLS)-based Ethernet VPN (EVPN) implementation of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to trigger a denial of service (DoS) condition on an affected device. The vulnerability is due to a logic error that occurs when the affected software processes specific EVPN routing information. An attacker could exploit this vulnerability by injecting malicious traffic patterns into the targeted EVPN network. A successful exploit could result in a crash of the l2vpn_mgr process on Provider Edge (PE) device members of the same EVPN instance (EVI). On each of the affected devices, a crash could lead to system instability and the inability to process or forward traffic through the device, resulting in a DoS condition that would require manual intervention to restore normal operating conditions.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:6.1 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
6.1 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-754
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2019-1849

Source: BID
Type: Third Party Advisory, VDB Entry
108342

Source: XF
Type: UNKNOWN
cisco-cve20191849-dos(161063)

Source: CCN
Type: Cisco Security Advisory cisco-sa-20190515-iosxr-evpn-dos
Cisco IOS XR Software BGP MPLS-Based EVPN Denial of Service Vulnerability

Source: CISCO
Type: Vendor Advisory
20190515 Cisco IOS XR Software BGP MPLS-Based EVPN Denial of Service Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios_xr:*:*:*:*:*:*:*:* (Version >= 6.1.0 and < 6.3.3)
  • OR cpe:/o:cisco:ios_xr:*:*:*:*:*:*:*:* (Version >= 6.4.0 and < 6.4.2)
  • OR cpe:/o:cisco:ios_xr:*:*:*:*:*:*:*:* (Version >= 6.5.0 and < 6.5.2)
  • OR cpe:/o:cisco:ios_xr:*:*:*:*:*:*:*:* (Version >= 6.6.0 and < 6.6.1)

  • Configuration CCN 1:
  • cpe:/o:cisco:ios_xr_software:4.0.11:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco ios xr *
    cisco ios xr *
    cisco ios xr *
    cisco ios xr *
    cisco ios xr software 4.0.11