Cisco IOS And IOS-XE ANI Spoof Responses Vulnerabilities
23 Jun. 2015
The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to spoof Autonomic Networking Registration Authority (ANRA) responses, and consequently bypass intended device and node access restrictions or cause a denial of service (disrupted domain access)
The information has been provided by Cisco.
* Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S
* Cisco IOS after 15.4 and IOS XE 3.after 3.13.1S
Several vulnerabilities were reported in Cisco IOS and IOS-XE. A remote user can cause denial of service conditions on the target system. A remote user can spoof ANRA responses.The system does not properly validate Autonomic Networking (AN) response messages. A remote user can send specially crafted AN response messages to spoof Autonomic Networking Registration Authority (ANRA) messages and cause the target device to bootstrap into an untrusted autonomic domain [CVE-2015-0635]. This can be exploited to obtain limited command and control access to the AN node, cause denial of service conditions, and disrupt access to the valid autonomic domain.