A vulnerability in Unified Threat Defense (UTD) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to improper validation of IPv6 packets through the UTD feature. An attacker could exploit this vulnerability by sending IPv6 traffic through an affected device that is configured with UTD. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition.
References
Link | Resource |
---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20190925-utd | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2019-09-25 21:15
Updated : 2024-02-28 17:28
NVD link : CVE-2019-12657
Mitre link : CVE-2019-12657
CVE.ORG link : CVE-2019-12657
JSON object : View
Products Affected
cisco
- catalyst_3850-16xs-e
- catalyst_3650-8x24pd-e
- catalyst_3650-12x48fd-l
- catalyst_3650-48fqm-s
- catalyst_3650-48ts-l
- catalyst_3850-32xs-s
- catalyst_3650-48tq-s
- 4431_integrated_services_router
- asr_1002-hx
- catalyst_3650-24pd-e
- 4321_integrated_services_router
- catalyst_3850-24p-s
- catalyst_3850-24xu-e
- catalyst_3850-24xs-s
- catalyst_3650-8x24pd-s
- catalyst_3650-24pd-s
- catalyst_3650-48td-s
- catalyst_3850-48xs-f-e
- catalyst_3650-48pd-e
- catalyst_3650-24td-e
- catalyst_3650-12x48fd-e
- catalyst_3650-8x24uq-l
- catalyst_3850-48u-e
- catalyst_3650-48fq-e
- catalyst_3650-48fd-s
- asr_1000_
- catalyst_3850-24u-l
- catalyst_3650-24ps-l
- catalyst_3650-48tq-e
- catalyst_3650-12x48uq-e
- catalyst_3650-48ts-s
- catalyst_3650-48pq-e
- catalyst_3650-48pd-s
- catalyst_3850-48f-s
- catalyst_3650-48ps-l
- catalyst_3650-12x48uz-l
- catalyst_3850-24xu-s
- catalyst_3650-12x48uz-s
- catalyst_3650-48fs-e
- catalyst_3650-24ts-e
- catalyst_3650-48td-e
- catalyst_3850-48p-l
- catalyst_c3850-12x48u-l
- catalyst_3650-12x48ur-l
- catalyst_3650-12x48ur-s
- catalyst_3850-24u-s
- catalyst_3850-24t-l
- asr_1002-x
- catalyst_3650-12x48uz-e
- catalyst_3650-24td-s
- catalyst_3850-24p-l
- catalyst_3850-12s-e
- catalyst_3850-12xs-s
- catalyst_3650-8x24uq-e
- asr_1001-x
- catalyst_3650-8x24uq-s
- catalyst_3650-12x48fd-s
- catalyst_3650-48fd-l
- catalyst_3650-48tq-l
- catalyst_3850-24xu-l
- catalyst_c3850-12x48u-e
- catalyst_3650-48fs-s
- 4351_integrated_services_router
- 4451-x_integrated_services_router
- asr_1001-hx
- catalyst_3850-24p-e
- catalyst_3650-48pq-l
- 4331_integrated_services_router
- catalyst_3850-24xs-e
- catalyst_3850-24u-e
- catalyst_c3850-12x48u-s
- catalyst_3650-48td-l
- cloud_services_router_1000v
- catalyst_3650-24td-l
- catalyst_3650-12x48uq-s
- catalyst_3650-48ts-e
- catalyst_3850-48p-s
- catalyst_3650-48fs-l
- catalyst_3850-48xs-e
- catalyst_3650-24pdm-s
- catalyst_3850-48p-e
- catalyst_3650-48pd-l
- catalyst_3650-12x48uq-l
- catalyst_3850-12s-s
- catalyst_3650-12x48ur-e
- catalyst_3850-48xs-s
- catalyst_3650-48ps-s
- catalyst_3850-48u-s
- catalyst_3850-48u-l
- catalyst_3650-24ts-s
- catalyst_3650-48fd-e
- catalyst_3850-48t-l
- catalyst_3850-48f-e
- catalyst_3650-24pdm-l
- catalyst_3850-48xs-f-s
- catalyst_3850-12xs-e
- ios_xe
- catalyst_3650-24pd-l
- catalyst_3650-48fq-l
- catalyst_3850-24t-e
- catalyst_3650-48fqm-l
- catalyst_3650-24pdm-e
- catalyst_3650-8x24pd-l
- catalyst_3650-48ps-e
- catalyst_3850-16xs-s
- catalyst_3850-24s-e
- catalyst_3650-48fqm-e
- catalyst_3850-48t-s
- catalyst_3850-48f-l
- catalyst_3650-48pq-s
- catalyst_3650-48fq-s
- catalyst_3650-24ts-l
- catalyst_3850-32xs-e
- catalyst_3850-48t-e
- catalyst_3850-24s-s
- catalyst_3650-24ps-e
- catalyst_3850-24t-s
- catalyst_3650-24ps-s
CWE
CWE-20
Improper Input Validation