CVE-2019-12663 — Improper Input Validation in Cisco IOS XE Software
Severity
8.6HIGHNVD
EPSS
0.3%
top 49.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedSep 25
Latest updateMay 24
Description
A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 3.9 | Impact: 4.0
Affected Packages2 packages
🔴Vulnerability Details
2GHSA▶
GHSA-6jpf-pwf8-qj8x: A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthentica↗2022-05-24
CVEList▶
Cisco IOS XE Software TrustSec Protected Access Credential Provisioning Denial of Service Vulnerability↗2019-09-25
📋Vendor Advisories
1Cisco▶
Cisco IOS XE Software TrustSec Protected Access Credential Provisioning Denial of Service Vulnerability↗2019-09-25