Networking-Forums.com

Professional Discussions => Vendor Advisories => Topic started by: Netwörkheäd on March 06, 2021, 06:48:29 PM

Title: Cisco Security Advisory - Cisco ASR 5000 Series Software (StarOS) ipsecmgr Process Denial of Service Vulnerability
Post by: Netwörkheäd on March 06, 2021, 06:48:29 PM
Cisco ASR 5000 Series Software (StarOS) ipsecmgr Process Denial of Service Vulnerability

A vulnerability in the ipsecmgr process of Cisco ASR 5000 Series Software (StarOS) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.


This vulnerability is due to insufficient validation of incoming Internet Key Exchange Version 2 (IKEv2) packets. An attacker could exploit this vulnerability by sending specifically malformed IKEv2 packets to an affected device. A successful exploit could allow the attacker to cause the ipsecmgr process to restart, which would disrupt ongoing IKE negotiations and result in a temporary DoS condition.


Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.


This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ipsecmgr-dos-3gkHXwvS



     
         
Security Impact Rating:  Medium
   
   
       
CVE: CVE-2021-1424
Source: Cisco ASR 5000 Series Software (StarOS) ipsecmgr Process Denial of Service Vulnerability (https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-staros-ipsecmgr-dos-3gkHXwvS?vs_f=Cisco%20Security%20Advisory&vs_cat=Security%20Intelligence&vs_type=RSS&vs_p=Cisco%20ASR%205000%20Series%20Software%20(StarOS)%20ipsecmgr%20Process%20Denial%20of%20Service%20Vulnerability&vs_k=1)