Cisco IOS And IOS-XE ANI Disrupted Domain Access Vulnerabilities
27 Jul. 2015
The Autonomic Networking Infrastructure (ANI) implementation in Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S allows remote attackers to cause a denial of service (disrupted domain access) via spoofed AN messages that reset a finite state machine,
The information has been provided by Cisco.
* Cisco IOS 12.2, 12.4, 15.0, 15.2, 15.3, and 15.4 and IOS XE 3.10.xS through 3.13.xS before 3.13.1S
* Cisco IOS after 15.4 and IOS XE 3.after 3.13.1S
Several vulnerabilities were reported in Cisco IOS and IOS-XE. A remote user can cause denial of service conditions on the target system. A remote user can spoof ANRA responses.The system does not properly validate Autonomic Networking (AN) response messages. A remote user can send specially crafted AN response messages to spoof Autonomic Networking Registration Authority (ANRA) messages and cause the target device to bootstrap into an untrusted autonomic domain [CVE-2015-0635]. This can be exploited to obtain limited command and control access to the AN node, cause denial of service conditions, and disrupt access to the valid autonomic domain.