CVE-2022-20849
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
15/11/2024
Last modified:
01/08/2025
Description
A vulnerability in the Broadband Network Gateway PPP over Ethernet (PPPoE) feature of Cisco&nbsp;IOS XR Software could allow an unauthenticated, adjacent attacker to cause the PPPoE process to continually crash.<br />
This vulnerability exists because the PPPoE feature does not properly handle an error condition within a specific crafted packet sequence. An attacker could exploit this vulnerability by sending a sequence of specific PPPoE packets from controlled customer premises equipment (CPE). A successful exploit could allow the attacker to cause the PPPoE process to continually restart, resulting in a denial of service condition (DoS).Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco&nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
Impact
Base Score 3.x
6.10
Severity 3.x
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.5.15:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.7.3:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.7.35:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.8.1:*:*:*:*:*:*:* | ||
| cpe:2.3:o:cisco:ios_xr:6.8.2:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



