{"id": "CVE-2021-34720", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "MEDIUM", "availabilityImpact": "PARTIAL", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.6, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 3.9}, {"type": "Secondary", "source": "ykramarz@cisco.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 8.6, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "HIGH", "privilegesRequired": "NONE", "confidentialityImpact": "NONE"}, "impactScore": 4.0, "exploitabilityScore": 3.9}]}, "published": "2021-09-09T05:15:11.463", "references": [{"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ipsla-ZA3SRrpP", "tags": ["Vendor Advisory"], "source": "ykramarz@cisco.com"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "NVD-CWE-Other"}]}, {"type": "Secondary", "source": "ykramarz@cisco.com", "description": [{"lang": "en", "value": "CWE-771"}]}], "descriptions": [{"lang": "en", "value": "A vulnerability in the IP Service Level Agreements (IP SLA) responder and Two-Way Active Measurement Protocol (TWAMP) features of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause device packet memory to become exhausted or cause the IP SLA process to crash, resulting in a denial of service (DoS) condition. This vulnerability exists because socket creation failures are mishandled during the IP SLA and TWAMP processes. An attacker could exploit this vulnerability by sending specific IP SLA or TWAMP packets to an affected device. A successful exploit could allow the attacker to exhaust the packet memory, which will impact other processes, such as routing protocols, or crash the IP SLA process."}, {"lang": "es", "value": "Una vulnerabilidad en las funciones de respuesta de los Acuerdos de Nivel de Servicio IP (IP SLA) y del Protocolo de Medici\u00f3n Activa de Dos V\u00edas (TWAMP) de Cisco IOS XR Software podr\u00eda permitir a un atacante remoto no autenticado causar el agotamiento de la memoria de paquetes del dispositivo o causar el bloqueo del proceso IP SLA, resultando en una condici\u00f3n de denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad Se presenta porque los fallos en la creaci\u00f3n de sockets son manejados inapropiadamente durante los procesos IP SLA y TWAMP. Un atacante podr\u00eda explotar esta vulnerabilidad mediante el env\u00edo de paquetes espec\u00edficos de IP SLA o TWAMP a un dispositivo afectado. Una explotaci\u00f3n con \u00e9xito podr\u00eda permitir a un atacante agotar la memoria de paquetes, lo que afectar\u00eda a otros procesos, como los protocolos de enrutamiento, o bloquear\u00eda el proceso IP SLA"}], "lastModified": "2023-11-07T03:36:11.803", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75", "versionEndExcluding": "6.2.3"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19A362A-DF30-4B02-832E-FB5389C9400E", "versionEndExcluding": "6.3.2", "versionStartIncluding": "6.3.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA", "versionEndExcluding": "7.2.2", "versionStartIncluding": "6.5.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:asr_9000v-v2:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DB91BE23-C710-473F-8E43-0E0DE760F8AD"}, {"criteria": "cpe:2.3:h:cisco:asr_9001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "324C97E6-1810-404F-9F45-6240F99FF039"}, {"criteria": "cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "57EB55BB-41B7-40A1-B6F5-142FE8AB4C16"}, {"criteria": "cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "433F4A82-04A4-4EAA-8C19-F7581DCD8D29"}, {"criteria": "cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2D5E60AB-94FF-448A-89D8-5D2197E21C74"}, {"criteria": "cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "91474DBC-FB31-4DDF-96C5-311FA1D53A74"}, {"criteria": "cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "FA241214-2F05-4360-9B50-385355E29CF4"}, {"criteria": "cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A93212A4-50AB-42E7-89A4-5FBBAEA050C3"}, {"criteria": "cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EDA53A61-98B3-458C-8893-61CD7D6B1E48"}, {"criteria": "cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F396564E-B477-4A27-A189-CEB737552E25"}, {"criteria": "cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5445CC54-ACFB-4070-AF26-F91FEAA85181"}, {"criteria": "cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "D7AA58E5-D7E1-48CF-93FF-C60EB85B2BC7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75", "versionEndExcluding": "6.2.3"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19A362A-DF30-4B02-832E-FB5389C9400E", "versionEndExcluding": "6.3.2", "versionStartIncluding": "6.3.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA", "versionEndExcluding": "7.2.2", "versionStartIncluding": "6.5.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ios_xrv:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6F39CC9A-297B-428A-82B4-BA0B83AA85CD"}, {"criteria": "cpe:2.3:h:cisco:ios_xrv_9000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "EEE98C3E-67E2-43A3-AEA9-1575F2B93A78"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75", "versionEndExcluding": "6.2.3"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19A362A-DF30-4B02-832E-FB5389C9400E", "versionEndExcluding": "6.3.2", "versionStartIncluding": "6.3.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA", "versionEndExcluding": "7.2.2", "versionStartIncluding": "6.5.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs_520:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "5249FE7A-FAAE-42C4-9250-DF4B2009F420"}, {"criteria": "cpe:2.3:h:cisco:ncs_540:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BC7AE6C1-B7C6-4056-9719-B5CFF71970AD"}, {"criteria": "cpe:2.3:h:cisco:ncs_540_fronthaul:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F9C17E4B-1B14-42F2-BCE6-2D5020625382"}, {"criteria": "cpe:2.3:h:cisco:ncs_560-4:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "BB01E968-E838-4D3C-B603-BF7E4E0F8A2C"}, {"criteria": "cpe:2.3:h:cisco:ncs_560-7:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "08864A59-0840-4407-8D30-9CE34BAF05E7"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75", "versionEndExcluding": "6.2.3"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19A362A-DF30-4B02-832E-FB5389C9400E", "versionEndExcluding": "6.3.2", "versionStartIncluding": "6.3.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA", "versionEndExcluding": "7.2.2", "versionStartIncluding": "6.5.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs_5001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E2A8C028-107B-4410-BCC6-5BCB8DB63603"}, {"criteria": "cpe:2.3:h:cisco:ncs_5002:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DA13FE67-F4AE-46DF-921B-3FB91BDF742B"}, {"criteria": "cpe:2.3:h:cisco:ncs_5011:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "98622F14-CC47-45E0-85E4-A7243309487C"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75", "versionEndExcluding": "6.2.3"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19A362A-DF30-4B02-832E-FB5389C9400E", "versionEndExcluding": "6.3.2", "versionStartIncluding": "6.3.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA", "versionEndExcluding": "7.2.2", "versionStartIncluding": "6.5.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs_4009:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F40E779D-5865-4E4B-AE2D-CF1860BA19E2"}, {"criteria": "cpe:2.3:h:cisco:ncs_4016:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "DC6A867F-E809-4CB5-82DB-2670CB0A6359"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75", "versionEndExcluding": "6.2.3"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19A362A-DF30-4B02-832E-FB5389C9400E", "versionEndExcluding": "6.3.2", "versionStartIncluding": "6.3.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA", "versionEndExcluding": "7.2.2", "versionStartIncluding": "6.5.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs_5501:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0A972EFE-4F7E-4BFC-8631-66A2D16B74A3"}, {"criteria": "cpe:2.3:h:cisco:ncs_5501-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "1B254955-C485-45D7-A19B-E78CE1D997AD"}, {"criteria": "cpe:2.3:h:cisco:ncs_5502:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "7F72AEF0-EE70-40F8-B52B-1390820B87BB"}, {"criteria": "cpe:2.3:h:cisco:ncs_5502-se:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "50C7B71A-2559-4E90-BAAA-C6FAAFE35FC3"}, {"criteria": "cpe:2.3:h:cisco:ncs_5508:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "43D21B01-A754-474F-8E46-14D733AB307E"}, {"criteria": "cpe:2.3:h:cisco:ncs_5516:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "17D6424C-972F-459C-B8F7-04FFD9F541BC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75", "versionEndExcluding": "6.2.3"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19A362A-DF30-4B02-832E-FB5389C9400E", "versionEndExcluding": "6.3.2", "versionStartIncluding": "6.3.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA", "versionEndExcluding": "7.2.2", "versionStartIncluding": "6.5.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs_6000:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "523058BF-DE14-4FAD-8A67-C8CA795032D9"}, {"criteria": "cpe:2.3:h:cisco:ncs_6008:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "61AF653C-DCD4-4B20-A555-71120F9A5BB9"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75", "versionEndExcluding": "6.2.3"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19A362A-DF30-4B02-832E-FB5389C9400E", "versionEndExcluding": "6.3.2", "versionStartIncluding": "6.3.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA", "versionEndExcluding": "7.2.2", "versionStartIncluding": "6.5.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:ncs_1001:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "0F6E0FBE-70B7-413C-8943-39BEFE050298"}, {"criteria": "cpe:2.3:h:cisco:ncs_1002:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "37AE5FB0-D9A6-4EBE-9F7F-243299AE918B"}, {"criteria": "cpe:2.3:h:cisco:ncs_1004:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "60C9AAF8-4C5B-4EF5-B575-8235F3C54BCC"}], "operator": "OR"}], "operator": "AND"}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C3C4D0F-CAF7-44E8-9B7E-E45D00457A75", "versionEndExcluding": "6.2.3"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D19A362A-DF30-4B02-832E-FB5389C9400E", "versionEndExcluding": "6.3.2", "versionStartIncluding": "6.3.0"}, {"criteria": "cpe:2.3:o:cisco:ios_xr:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CFFB34B7-8C3B-4C5F-8521-B6EAE9CBFBEA", "versionEndExcluding": "7.2.2", "versionStartIncluding": "6.5.0"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:cisco:8101-32fh:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "E055F58F-F9FB-4B27-841E-61ECAB5F42B8"}, {"criteria": "cpe:2.3:h:cisco:8101-32h:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "2B832863-E366-46ED-BC35-838762F0CE29"}, {"criteria": "cpe:2.3:h:cisco:8102-64h:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A3C3DDAC-7D0F-4D1D-9632-F001F2EB5D34"}, {"criteria": "cpe:2.3:h:cisco:8201:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3D8E7FFF-82A8-4ECB-BA0C-CBF0C2FDA3A3"}, {"criteria": "cpe:2.3:h:cisco:8201-32fh:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "528BE0D3-E5ED-4836-B0D8-0C8508C5BDD7"}, {"criteria": "cpe:2.3:h:cisco:8202:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "87DC4C2F-01C5-4D89-8D79-E5D28EDAD0F2"}, {"criteria": "cpe:2.3:h:cisco:8804:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "6655851F-58D9-49D9-A56E-8440A7F7BB45"}, {"criteria": "cpe:2.3:h:cisco:8808:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "F5E2AE67-DED3-4414-A194-386ADB2C8DC7"}, {"criteria": "cpe:2.3:h:cisco:8812:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "3920133A-684D-4A9F-B65A-FF4EAE5052E5"}, {"criteria": "cpe:2.3:h:cisco:8818:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "9ED06361-5A68-4656-AEA5-240C290594CD"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "ykramarz@cisco.com"}