Vulnslist

find the latest Cisco vulnerabilities

Cisco ASR 5000 System Architecture Evolution Gateway High CPU Utilization Vulnerability

Cisco-SA-20150217-CVE-2015-0617 · Medium · Published · Updated

A vulnerability in the Simple Network Management Protocol (SNMP) code of Cisco ASR 5500 System Architecture Evolution (SAE) Gateway could allow an unauthenticated, remote attacker to cause high CPU utilization and the SNMP process may stop responding. The vulnerability is due to insufficient validation of malformed SNMP packets. An attacker could exploit this vulnerability by sending malformed SNMP packets to the affected system. Cisco has confirmed the vulnerability in a security notice; however, software updates are not available. To exploit this vulnerability, an attacker may need access to trusted, internal networks to send malformed SNMP packets to the targeted device. This access requirement may reduce the likelihood of a successful exploit. Cisco indicates through the CVSS score that functional exploit code exists; however, the code is not known to be publicly available.

Workarounds

Administrators are advised to contact the vendor regarding future updates and releases.

Administrators are advised to allow only trusted users to have network access.

Administrators can help protect affected systems from external attacks by using a solid firewall strategy.

Administrators may consider using IP-based access control lists (ACLs) to allow only trusted systems to access the affected systems.

Administrators are advised to monitor affected systems.

CVEsCVE-2015-0617
Cisco Bug IDsCSCur13393
CVSS ScoreBase 5.0
Base 5.0 AV:N/AC:L/Au:N/C:N/I:N/A:P/E:F/RL:U/RC:C
Product Names From Source
Cisco ASR 5000 Series Software

Related Products

Product CVE Evidence