CVE-2018-15428
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
05/10/2018
Last modified:
09/10/2019
Description
A vulnerability in the implementation of Border Gateway Protocol (BGP) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain BGP update messages. An attacker could exploit this vulnerability by sending BGP update messages that include a specific, malformed attribute to be processed by an affected system. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. To exploit this vulnerability, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.
Impact
Base Score 3.x
6.80
Severity 3.x
MEDIUM
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios_xr:6.0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.1.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.1.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:* | ||
| cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



