Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2019-12652


A vulnerability in the ingress packet processing function of Cisco IOS Software for Cisco Catalyst 4000 Series Switches could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to improper resource allocation when processing TCP packets directed to the device on specific Cisco Catalyst 4000 Series Switches. An attacker could exploit this vulnerability by sending crafted TCP streams to an affected device. A successful exploit could cause the affected device to run out of buffer resources, impairing operations of control plane and management plane protocols, resulting in a DoS condition. This vulnerability can be triggered only by traffic that is destined to an affected device and cannot be exploited using traffic that transits an affected device.


Published

2019-09-25T21:15:10.593

Last Modified

2024-11-21T04:23:16.060

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.5 (HIGH)

CVSSv2 Vector

AV:N/AC:L/Au:N/C:N/I:N/A:C

  • Access Vector: NETWORK
  • Access Complexity: LOW
  • Authentication: NONE
  • Confidentiality Impact: NONE
  • Integrity Impact: NONE
  • Availability Impact: COMPLETE
Exploitability Score

10.0

Impact Score

6.9

Weaknesses
  • Type: Secondary
    CWE-399
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Operating System cisco ios 15.2\(3\)e1 Yes
Operating System cisco ios 15.2\(4\)e3 Yes
Hardware cisco catalyst_4500_supervisor_engine_6-e - No
Hardware cisco catalyst_4500_supervisor_engine_6l-e - No
Hardware cisco catalyst_4900m - No
Hardware cisco catalyst_4948e - No
Hardware cisco catalyst_4948e-f - No

References