Description
A vulnerability in the filesystem resource management code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to exhaust filesystem resources on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to ineffective management of the underlying filesystem resources. An attacker could exploit this vulnerability by performing specific actions that result in messages being sent to specific operating system log files. A successful exploit could allow the attacker to exhaust available filesystem space on an affected device. This could cause the device to crash and reload, resulting in a DoS condition for clients whose network traffic is transiting the device. Upon reload of the device, the impacted filesystem space is cleared, and the device will return to normal operation. However, continued exploitation of this vulnerability could cause subsequent forced crashes and reloads, which could lead to an extended DoS condition.
Published: 2019-09-25
Score: 7.5 High
EPSS: 1.0% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2019-4249 A vulnerability in the filesystem resource management code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to exhaust filesystem resources on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to ineffective management of the underlying filesystem resources. An attacker could exploit this vulnerability by performing specific actions that result in messages being sent to specific operating system log files. A successful exploit could allow the attacker to exhaust available filesystem space on an affected device. This could cause the device to crash and reload, resulting in a DoS condition for clients whose network traffic is transiting the device. Upon reload of the device, the impacted filesystem space is cleared, and the device will return to normal operation. However, continued exploitation of this vulnerability could cause subsequent forced crashes and reloads, which could lead to an extended DoS condition.
History

Tue, 19 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco 1100 Integrated Services R 4221 Integrated Services R 4321 Integrated Services R 4331 Integrated Services R 4351 Integrated Services R 4431 Integrated Services R 4451-x Integrated Services R Asr 1000 Asr 1001-hx R Asr 1001-x R Asr 1002-hx R Asr 1002-x R Asr 900 Asr 900 Asr 920-10sz-pd R Asr 920-12cz-a R Asr 920-12cz-d R Asr 920-12sz-im R Asr 920-24sz-im R Asr 920-24sz-m R Asr 920-24tz-m R Asr 920-4sz-a R Asr 920-4sz-d R Catalyst 3650-12x48uq-e Catalyst 3650-12x48uq-l Catalyst 3650-12x48uq-s Catalyst 3650-12x48ur-e Catalyst 3650-12x48ur-l Catalyst 3650-12x48ur-s Catalyst 3650-12x48uz-e Catalyst 3650-24pd-e Catalyst 3650-24pd-l Catalyst 3650-24pd-s Catalyst 3650-24pdm-e Catalyst 3650-24pdm-l Catalyst 3650-24pdm-s Catalyst 3650-24ps-e Catalyst 3650-24ps-l Catalyst 3650-24ps-s Catalyst 3650-24td-e Catalyst 3650-24td-l Catalyst 3650-24td-s Catalyst 3650-24ts-e Catalyst 3650-24ts-l Catalyst 3650-24ts-s Catalyst 3650-48fd-e Catalyst 3650-48fd-l Catalyst 3650-48fd-s Catalyst 3650-48fq-e Catalyst 3650-48fq-l Catalyst 3650-48fq-s Catalyst 3650-48fqm-e Catalyst 3650-48fqm-l Catalyst 3650-48fqm-s Catalyst 3650-48fs-e Catalyst 3650-48fs-l Catalyst 3650-48fs-s Catalyst 3650-48pd-e Catalyst 3650-48pd-l Catalyst 3650-48pd-s Catalyst 3650-48pq-e Catalyst 3650-48pq-l Catalyst 3650-48pq-s Catalyst 3650-48ps-e Catalyst 3650-48ps-l Catalyst 3650-48ps-s Catalyst 3650-48td-e Catalyst 3650-48td-l Catalyst 3650-48td-s Catalyst 3650-48tq-e Catalyst 3650-48tq-l Catalyst 3650-48tq-s Catalyst 3650-48ts-e Catalyst 3650-48ts-l Catalyst 3650-48ts-s Catalyst 3650-8x24uq-e Catalyst 3650-8x24uq-l Catalyst 3650-8x24uq-s Catalyst 3850-12s-e Catalyst 3850-12s-s Catalyst 3850-12xs-e Catalyst 3850-12xs-s Catalyst 3850-16xs-e Catalyst 3850-16xs-s Catalyst 3850-24p-e Catalyst 3850-24p-l Catalyst 3850-24p-s Catalyst 3850-24s-e Catalyst 3850-24s-s Catalyst 3850-24t-e Catalyst 3850-24t-l Catalyst 3850-24t-s Catalyst 3850-24u-e Catalyst 3850-24u-l Catalyst 3850-24u-s Catalyst 3850-24xs-e Catalyst 3850-24xs-s Catalyst 3850-24xu-e Catalyst 3850-24xu-l Catalyst 3850-24xu-s Catalyst 3850-32xs-e Catalyst 3850-32xs-s Catalyst 3850-48f-e Catalyst 3850-48f-l Catalyst 3850-48f-s Catalyst 3850-48p-e Catalyst 3850-48p-l Catalyst 3850-48p-s Catalyst 3850-48t-e Catalyst 3850-48t-l Catalyst 3850-48t-s Catalyst 3850-48u-e Catalyst 3850-48u-l Catalyst 3850-48u-s Catalyst 3850-48xs-e Catalyst 3850-48xs-f-e Catalyst 3850-48xs-f-s Catalyst 3850-48xs-s Catalyst 9300 Catalyst 9300-24p-a Catalyst 9300-24p-e Catalyst 9300-24t-a Catalyst 9300-24t-e Catalyst 9300-24u-a Catalyst 9300-24u-e Catalyst 9300-48p-a Catalyst 9300-48p-e Catalyst 9300-48t-a Catalyst 9300-48t-e Catalyst 9300-48u-a Catalyst 9300-48u-e Catalyst 9400 Supervisor Engine-1 Catalyst 9407r Catalyst 9410r Catalyst 9500 Catalyst C3850-12x48u-e Catalyst C3850-12x48u-l Catalyst C3850-12x48u-s Catalyst C9500-12q-a Catalyst C9500-12q-e Catalyst C9500-24q-a Catalyst C9500-24q-e Catalyst C9500-40x-a Catalyst C9500-40x-e Cloud Services R 1000v Ios Xe Ncs 4201 Ncs 4202 Ncs 4206 Ncs 4216 Network Convergence System 520
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-19T18:55:00.290Z

Reserved: 2019-06-04T00:00:00.000Z

Link: CVE-2019-12658

cve-icon Vulnrichment

Updated: 2024-08-04T23:24:39.227Z

cve-icon NVD

Status : Modified

Published: 2019-09-25T21:15:10.953

Modified: 2024-11-21T04:23:17.553

Link: CVE-2019-12658

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses