Vulnerabilities > Cisco > ASR 5000 Software > 19.0.m0.61045

DATE CVE VULNERABILITY TITLE RISK
2017-07-10 CVE-2017-6729 Unspecified vulnerability in Cisco ASR 5000 Software
A vulnerability in the Border Gateway Protocol (BGP) processing functionality of the Cisco StarOS operating system for Cisco ASR 5000 Series Routers and Cisco Virtualized Packet Core (VPC) Software could allow an unauthenticated, remote attacker to cause the BGP process on an affected system to reload, resulting in a denial of service (DoS) condition.
network
low complexity
cisco
5.0
2016-11-03 CVE-2016-6455 Resource Management Errors vulnerability in Cisco ASR 5000 Software
A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition.
network
low complexity
cisco CWE-399
5.0
2016-07-15 CVE-2016-1452 Information Exposure vulnerability in Cisco ASR 5000 and ASR 5000 Software
Cisco ASR 5000 devices with software 18.3 through 20.0.0 allow remote attackers to make configuration changes over SNMP by leveraging knowledge of the read-write community, aka Bug ID CSCuz29526.
network
low complexity
cisco CWE-200
6.4
2016-06-23 CVE-2016-1436 Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in Cisco ASR 5000 Software
The General Packet Radio Switching Tunneling Protocol 1 (aka GTPv1) implementation on Cisco ASR 5000 Packet Data Network Gateway devices before 19.4 allows remote attackers to cause a denial of service (Session Manager process restart) via a crafted GTPv1 packet, aka Bug ID CSCuz46198.
network
low complexity
cisco CWE-119
5.0
2015-10-16 CVE-2015-6334 Improper Input Validation vulnerability in Cisco ASR 5000 Software 18.0.0.57828/19.0.M0.61045
Cisco ASR 5000 and 5500 devices with software 18.0.0.57828 and 19.0.M0.61045 allow remote attackers to cause a denial of service (vpnmgr process restart) via a crafted header in a TACACS packet, aka Bug ID CSCuw01984.
network
low complexity
cisco CWE-20
5.0