A vulnerability in the Slowpath of StarOS for Cisco ASR 5500 Series routers with Data Processing Card 2 (DPC2) could allow an unauthenticated, remote attacker to cause a subset of the subscriber sessions to be disconnected, resulting in a partial denial of service (DoS) condition. This vulnerability affects Cisco ASR 5500 devices with Data Processing Card 2 (DPC2) running StarOS 18.0 or later. More Information: CSCvb12081. Known Affected Releases: 18.7.4 19.5.0 20.0.2.64048 20.2.3 21.0.0. Known Fixed Releases: 18.7.4 18.7.4.65030 18.8.M0.65044 19.5.0 19.5.0.65092 19.5.M0.65023 19.5.M0.65050 20.2.3 20.2.3.64982 20.2.3.65017 20.2.a4.65307 20.3.M0.64984 20.3.M0.65029 20.3.M0.65037 20.3.M0.65071 20.3.T0.64985 20.3.T0.65031 20.3.T0.65043 20.3.T0.65067 21.0.0 21.0.0.65256 21.0.M0.64922 21.0.M0.64983 21.0.M0.65140 21.0.V0.65150 21.1.A0.64932 21.1.A0.64987 21.1.A0.65145 21.1.PP0.65270 21.1.R0.65130 21.1.R0.65135 21.1.R0.65154 21.1.VC0.65203 21.2.A0.65147.
This vulnerability carries a HIGH severity rating with a CVSS v3.1 score of 7.5, indicating it can be exploited remotely over the network with relatively low complexity without requiring user interaction and does not require pre-existing privileges . The vulnerability impacts and availability (service disruption) for affected systems. Impacting 2 products from cisco, from cisco organizations running these solutions should prioritize assessment and patching.
First disclosed in 2016, this vulnerability was reported during a period defined by widespread IoT adoption challenges, mobile security concerns, and the emergence of advanced persistent threat (APT) techniques. Contemporary mitigation strategies focused on secure development practices and third-party component vetting.
2016-11-03T21:59:10.967
2025-04-12T10:46:40.837
Deferred
CVSSv3.0: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Operating System | cisco | asr_5000_software | 18.0.0 | Yes |
| Operating System | cisco | asr_5000_software | 18.0.0.57828 | Yes |
| Operating System | cisco | asr_5000_software | 18.0.0.59167 | Yes |
| Operating System | cisco | asr_5000_software | 18.0.0.59211 | Yes |
| Operating System | cisco | asr_5000_software | 18.0.l0.59219 | Yes |
| Operating System | cisco | asr_5000_software | 18.1.0 | Yes |
| Operating System | cisco | asr_5000_software | 18.1.0.59776 | Yes |
| Operating System | cisco | asr_5000_software | 18.1.0.59780 | Yes |
| Operating System | cisco | asr_5000_software | 18.1_base | Yes |
| Operating System | cisco | asr_5000_software | 18.3.0 | Yes |
| Operating System | cisco | asr_5000_software | 18.3_base | Yes |
| Operating System | cisco | asr_5000_software | 18.4.0 | Yes |
| Operating System | cisco | asr_5000_software | 19.0.1 | Yes |
| Operating System | cisco | asr_5000_software | 19.0.m0.60737 | Yes |
| Operating System | cisco | asr_5000_software | 19.0.m0.60828 | Yes |
| Operating System | cisco | asr_5000_software | 19.0.m0.61045 | Yes |
| Operating System | cisco | asr_5000_software | 19.1.0 | Yes |
| Operating System | cisco | asr_5000_software | 19.1.0.61559 | Yes |
| Operating System | cisco | asr_5000_software | 19.2.0 | Yes |
| Operating System | cisco | asr_5000_software | 19.3.0 | Yes |
| Operating System | cisco | asr_5000_software | 20.0.0 | Yes |
| Hardware | cisco | asr_5500 | - | No |
SecUtils normalizes and enriches National Vulnerability Database (NVD) records by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and providing structured context for security teams. For cisco's affected products, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference data to enable rapid vulnerability prioritization and asset correlation. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for patch management, risk assessment, and security operations.