Vulnerabilities > CVE-2019-12647 - NULL Pointer Dereference vulnerability in Cisco IOS XE Fuji16.7.1/Fuji16.8.1
Summary
A vulnerability in the Ident protocol handler of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability exists because the affected software incorrectly handles memory structures, leading to a NULL pointer dereference. An attacker could exploit this vulnerability by opening a TCP connection to specific ports and sending traffic over that connection. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
OS | 2 | |
Hardware | Cisco
| 27 |
Common Weakness Enumeration (CWE)
Nessus
NASL family CISCO NASL id CISCO-SA-20190925-IOS-XE-IDENTD-DOS.NASL description According to its self-reported version, Cisco IOS XE Software is affected by a denial of service (DoS) vulnerability exists in Ident protocol handler of Cisco IOS and IOS XE Software due to incorrectly handling memory structures, leading to a NULL pointer dereference. An unauthenticated, remote attacker can exploit this issue, via opening a TCP connection to specific ports and sending traffic over that connection, to cause the affected device to reload, resulting in a denial of service (DoS) condition. Please see the included Cisco BIDs and Cisco Security Advisory for more information last seen 2020-06-01 modified 2020-06-02 plugin id 130022 published 2019-10-18 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130022 title Cisco IOS XR gRPC Software Denial of Service Vulnerability NASL family CISCO NASL id CISCO-SA-20190925-IOS-IDENTD-DOS.NASL description According to its self-reported version, Cisco IOS Software is affected by a denial of service (DoS) vulnerability exists in Ident protocol handler of Cisco IOS and IOS XE Software due to incorrectly handling memory structures, leading to a NULL pointer dereference. An unauthenticated, remote attacker can exploit this issue, via opening a TCP connection to specific ports and sending traffic over that connection, to cause the affected device to reload, resulting in a denial of service (DoS) condition. Please see the included Cisco BIDs and Cisco Security Advisory for more information last seen 2020-06-01 modified 2020-06-02 plugin id 130021 published 2019-10-18 reporter This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. source https://www.tenable.com/plugins/nessus/130021 title Cisco IOS XR gRPC Software Denial of Service Vulnerability