Vulnslist

find the latest Cisco vulnerabilities

Cisco IOS XR Software Enf Broker Denial of Service Vulnerability

cisco-sa-iosxr-dos-WwDdghs2 · High · Published · Updated

Multiple vulnerabilities in the ingress packet processing function of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. For more information about these vulnerabilities, see the Details section of this advisory. Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities. This advisory is available at the following link:https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-iosxr-dos-WwDdghs2

Workarounds

There are no workarounds for these vulnerabilities. However, multiple mitigations are available.

As a mitigation for CVE-2021-1288, customers can disable the Telnet protocol for incoming connections. Information on how to disable Telnet can be found in the Cisco Guide to Harden Cisco IOS XR Devices. https://sec.cloudapps.cisco.com/security/center/resources/increase_security_ios_xr_devices.html

Because CVE-2021-1313 can be exploited when processing a stream of either Telnet or ICMP protocol packets, the following steps for mitigation should be implemented together to ensure protection against the two attack vectors:

Disable the Telnet protocol for incoming connections.
Implement an access control entry (ACE) to an existing interface ACL or create a new ACL that denies ICMP traffic that is inbound to a specific interface. The following input is an example of how to create an IPv4 ACL and deny ICMP traffic:

P/0/0/CPU0:router(config)# ipv4 access-list deny icmp any any

For information on how to perform both of these mitigations, see the Cisco Guide to Harden Cisco IOS XR Devices https://sec.cloudapps.cisco.com/security/center/resources/increase_security_ios_xr_devices.html .

While these mitigations have been deployed and were proven successful in a test environment, customers should determine the applicability and effectiveness on their own environment and under their own use conditions. Customers should be aware that any workaround or mitigation that is implemented may negatively impact the functionality or performance of their network, based on intrinsic customer deployment scenarios and limitations. Customers should not deploy any workarounds or mitigations before first evaluating their applicability to their own environment and any impact to such environment.

CVEsCVE-2021-1288, CVE-2021-1313
Cisco Bug IDsCSCuz39742, CSCuy67256
CVSS ScoreBase 8.6
Base 8.6 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:X/RL:X/RC:X
Product Names From Source
Cisco IOS XR Software

Related Products

Product CVE Evidence
Cisco RV Series Routers CVE-2021-1313 Cisco OpenVuln
Cisco RV Series Routers CVE-2021-1288 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2021-1313 Cisco OpenVuln
Cisco Nexus Dashboard CVE-2021-1288 Cisco OpenVuln
Cisco IOS Software CVE-2021-1313 Cisco OpenVuln
Cisco IOS Software CVE-2021-1288 Cisco OpenVuln
Cisco IOS XR Software CVE-2021-1313 Cisco OpenVuln
Cisco IOS XR Software CVE-2021-1288 Cisco OpenVuln
Cisco IOS CVE-2021-1313 Cisco OpenVuln
Cisco IOS CVE-2021-1288 Cisco OpenVuln