8.6

CVE-2021-34720

A vulnerability in the IP Service Level Agreements (IP SLA) responder and Two-Way Active Measurement Protocol (TWAMP) features of Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause device packet memory to become exhausted or cause the IP SLA process to crash, resulting in a denial of service (DoS) condition. This vulnerability exists because socket creation failures are mishandled during the IP SLA and TWAMP processes. An attacker could exploit this vulnerability by sending specific IP SLA or TWAMP packets to an affected device. A successful exploit could allow the attacker to exhaust the packet memory, which will impact other processes, such as routing protocols, or crash the IP SLA process.

Data is provided by the National Vulnerability Database (NVD)
CiscoIos Xr Version < 6.2.3
   CiscoAsr 9000v-v2 Version-
   CiscoAsr 9001 Version-
   CiscoAsr 9006 Version-
   CiscoAsr 9010 Version-
   CiscoAsr 9901 Version-
   CiscoAsr 9902 Version-
   CiscoAsr 9903 Version-
   CiscoAsr 9904 Version-
   CiscoAsr 9906 Version-
   CiscoAsr 9910 Version-
   CiscoAsr 9912 Version-
   CiscoAsr 9922 Version-
CiscoIos Xr Version >= 6.3.0 < 6.3.2
   CiscoAsr 9000v-v2 Version-
   CiscoAsr 9001 Version-
   CiscoAsr 9006 Version-
   CiscoAsr 9010 Version-
   CiscoAsr 9901 Version-
   CiscoAsr 9902 Version-
   CiscoAsr 9903 Version-
   CiscoAsr 9904 Version-
   CiscoAsr 9906 Version-
   CiscoAsr 9910 Version-
   CiscoAsr 9912 Version-
   CiscoAsr 9922 Version-
CiscoIos Xr Version >= 6.5.0 < 7.2.2
   CiscoAsr 9000v-v2 Version-
   CiscoAsr 9001 Version-
   CiscoAsr 9006 Version-
   CiscoAsr 9010 Version-
   CiscoAsr 9901 Version-
   CiscoAsr 9902 Version-
   CiscoAsr 9903 Version-
   CiscoAsr 9904 Version-
   CiscoAsr 9906 Version-
   CiscoAsr 9910 Version-
   CiscoAsr 9912 Version-
   CiscoAsr 9922 Version-
CiscoIos Xr Version < 6.2.3
   CiscoIos Xrv Version-
   CiscoIos Xrv 9000 Version-
CiscoIos Xr Version >= 6.3.0 < 6.3.2
   CiscoIos Xrv Version-
   CiscoIos Xrv 9000 Version-
CiscoIos Xr Version >= 6.5.0 < 7.2.2
   CiscoIos Xrv Version-
   CiscoIos Xrv 9000 Version-
CiscoIos Xr Version < 6.2.3
   CiscoNcs 520 Version-
   CiscoNcs 540 Version-
   CiscoNcs 540 Fronthaul Version-
   CiscoNcs 560-4 Version-
   CiscoNcs 560-7 Version-
CiscoIos Xr Version >= 6.3.0 < 6.3.2
   CiscoNcs 520 Version-
   CiscoNcs 540 Version-
   CiscoNcs 540 Fronthaul Version-
   CiscoNcs 560-4 Version-
   CiscoNcs 560-7 Version-
CiscoIos Xr Version >= 6.5.0 < 7.2.2
   CiscoNcs 520 Version-
   CiscoNcs 540 Version-
   CiscoNcs 540 Fronthaul Version-
   CiscoNcs 560-4 Version-
   CiscoNcs 560-7 Version-
CiscoIos Xr Version < 6.2.3
   CiscoNcs 5001 Version-
   CiscoNcs 5002 Version-
   CiscoNcs 5011 Version-
CiscoIos Xr Version >= 6.3.0 < 6.3.2
   CiscoNcs 5001 Version-
   CiscoNcs 5002 Version-
   CiscoNcs 5011 Version-
CiscoIos Xr Version >= 6.5.0 < 7.2.2
   CiscoNcs 5001 Version-
   CiscoNcs 5002 Version-
   CiscoNcs 5011 Version-
CiscoIos Xr Version < 6.2.3
   CiscoNcs 4009 Version-
   CiscoNcs 4016 Version-
CiscoIos Xr Version >= 6.3.0 < 6.3.2
   CiscoNcs 4009 Version-
   CiscoNcs 4016 Version-
CiscoIos Xr Version >= 6.5.0 < 7.2.2
   CiscoNcs 4009 Version-
   CiscoNcs 4016 Version-
CiscoIos Xr Version < 6.2.3
   CiscoNcs 5501 Version-
   CiscoNcs 5501-se Version-
   CiscoNcs 5502 Version-
   CiscoNcs 5502-se Version-
   CiscoNcs 5508 Version-
   CiscoNcs 5516 Version-
CiscoIos Xr Version >= 6.3.0 < 6.3.2
   CiscoNcs 5501 Version-
   CiscoNcs 5501-se Version-
   CiscoNcs 5502 Version-
   CiscoNcs 5502-se Version-
   CiscoNcs 5508 Version-
   CiscoNcs 5516 Version-
CiscoIos Xr Version >= 6.5.0 < 7.2.2
   CiscoNcs 5501 Version-
   CiscoNcs 5501-se Version-
   CiscoNcs 5502 Version-
   CiscoNcs 5502-se Version-
   CiscoNcs 5508 Version-
   CiscoNcs 5516 Version-
CiscoIos Xr Version < 6.2.3
   CiscoNcs 6000 Version-
   CiscoNcs 6008 Version-
CiscoIos Xr Version >= 6.3.0 < 6.3.2
   CiscoNcs 6000 Version-
   CiscoNcs 6008 Version-
CiscoIos Xr Version >= 6.5.0 < 7.2.2
   CiscoNcs 6000 Version-
   CiscoNcs 6008 Version-
CiscoIos Xr Version < 6.2.3
   CiscoNcs 1001 Version-
   CiscoNcs 1002 Version-
   CiscoNcs 1004 Version-
CiscoIos Xr Version >= 6.3.0 < 6.3.2
   CiscoNcs 1001 Version-
   CiscoNcs 1002 Version-
   CiscoNcs 1004 Version-
CiscoIos Xr Version >= 6.5.0 < 7.2.2
   CiscoNcs 1001 Version-
   CiscoNcs 1002 Version-
   CiscoNcs 1004 Version-
CiscoIos Xr Version < 6.2.3
   Cisco8101-32fh Version-
   Cisco8101-32h Version-
   Cisco8102-64h Version-
   Cisco8201 Version-
   Cisco8201-32fh Version-
   Cisco8202 Version-
   Cisco8804 Version-
   Cisco8808 Version-
   Cisco8812 Version-
   Cisco8818 Version-
CiscoIos Xr Version >= 6.3.0 < 6.3.2
   Cisco8101-32fh Version-
   Cisco8101-32h Version-
   Cisco8102-64h Version-
   Cisco8201 Version-
   Cisco8201-32fh Version-
   Cisco8202 Version-
   Cisco8804 Version-
   Cisco8808 Version-
   Cisco8812 Version-
   Cisco8818 Version-
CiscoIos Xr Version >= 6.5.0 < 7.2.2
   Cisco8101-32fh Version-
   Cisco8101-32h Version-
   Cisco8102-64h Version-
   Cisco8201 Version-
   Cisco8201-32fh Version-
   Cisco8202 Version-
   Cisco8804 Version-
   Cisco8808 Version-
   Cisco8812 Version-
   Cisco8818 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 1.02% 0.766
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:N/A:P
psirt@cisco.com 8.6 3.9 4
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
CWE-771 Missing Reference to Active Allocated Resource

The product does not properly maintain a reference to a resource that has been allocated, which prevents the resource from being reclaimed.