Cisco Logo

CVE-2015-0769

A vulnerability in the IP version 6 (IPv6) processing code of Cisco IOS XR Software for Cisco CRS-3 Carrier Routing System could allow an unauthenticated, remote attacker to trigger an ASIC scan of the Network Processor Unit (NPU) and a reload of the line card processing an IPv6 packet.

The vulnerability is due to incorrect processing of an IPv6 packet carrying IPv6 extension headers that are valid but unlikely to be seen during normal operation. An attacker could exploit this vulnerability by sending such an IPv6 packet to an affected device that is configured to process IPv6 traffic. An exploit could allow the attacker to cause a reload of the line card, resulting in a DoS condition.

A Cisco CRS-3 Carrier Routing System device that meets all the conditions listed in the “Vulnerable Products” section of this advisory is affected by this vulnerability.

This vulnerability can be triggered by IPv6 transit traffic or IPv6 traffic destined to the device itself.

This vulnerability could be exploited repeatedly to cause an extended DoS condition.

This vulnerability has been assigned the Common Vulnerabilities and Exposures (CVE) ID CVE-2015-0769.

NO COMMENTS