CVE-2019-12663Improper Input Validation in Cisco IOS XE Software

Severity
8.6HIGHNVD
EPSS
0.3%
top 49.95%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedSep 25
Latest updateMay 24

Description

A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of attributes in RADIUS messages. An attacker could exploit this vulnerability by sending a malicious RADIUS message to an affected device while the device is in a specific state.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:HExploitability: 3.9 | Impact: 4.0

Affected Packages2 packages

CVEListV5cisco/cisco_ios_xe_softwareunspecifiedn/a
NVDcisco/ios_xe16.12.1, 16.6.4+1

🔴Vulnerability Details

2
GHSA
GHSA-6jpf-pwf8-qj8x: A vulnerability in the Cisco TrustSec (CTS) Protected Access Credential (PAC) provisioning module of Cisco IOS XE Software could allow an unauthentica2022-05-24
CVEList
Cisco IOS XE Software TrustSec Protected Access Credential Provisioning Denial of Service Vulnerability2019-09-25

📋Vendor Advisories

1
Cisco
Cisco IOS XE Software TrustSec Protected Access Credential Provisioning Denial of Service Vulnerability2019-09-25
CVE-2019-12663 — Improper Input Validation in Cisco | cvebase