CVE-2019-12663
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
25/09/2019
Last modified:
09/10/2019
Description
A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.
Impact
Base Score 3.x
8.60
Severity 3.x
HIGH
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:ios_xe:16.6.4:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios_xe:16.12.1:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24p-a:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24p-e:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24s-a:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24s-e:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24t-a:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24t-e:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24u-a:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24u-e:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24ux-a:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-24ux-e:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-48p-a:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-48p-e:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_9300-48s-a:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page