A vulnerability in the filesystem resource management code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to exhaust filesystem resources on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to ineffective management of the underlying filesystem resources. An attacker could exploit this vulnerability by performing specific actions that result in messages being sent to specific operating system log files. A successful exploit could allow the attacker to exhaust available filesystem space on an affected device. This could cause the device to crash and reload, resulting in a DoS condition for clients whose network traffic is transiting the device. Upon reload of the device, the impacted filesystem space is cleared, and the device will return to normal operation. However, continued exploitation of this vulnerability could cause subsequent forced crashes and reloads, which could lead to an extended DoS condition.

Project Subscriptions

Vendors Products
1100 Integrated Services R Subscribe
4221 Integrated Services R Subscribe
4321 Integrated Services R Subscribe
4331 Integrated Services R Subscribe
4351 Integrated Services R Subscribe
4431 Integrated Services R Subscribe
4451-x Integrated Services R Subscribe
Asr 1000 Subscribe
Asr 1001-hx R Subscribe
Asr 1001-x R Subscribe
Asr 1002-hx R Subscribe
Asr 1002-x R Subscribe
Asr 900 Subscribe
Asr 900 Subscribe
Asr 920-10sz-pd R Subscribe
Asr 920-12cz-a R Subscribe
Asr 920-12cz-d R Subscribe
Asr 920-12sz-im R Subscribe
Asr 920-24sz-im R Subscribe
Asr 920-24sz-m R Subscribe
Asr 920-24tz-m R Subscribe
Asr 920-4sz-a R Subscribe
Asr 920-4sz-d R Subscribe
Catalyst 3650-12x48uq-e Subscribe
Catalyst 3650-12x48uq-l Subscribe
Catalyst 3650-12x48uq-s Subscribe
Catalyst 3650-12x48ur-e Subscribe
Catalyst 3650-12x48ur-l Subscribe
Catalyst 3650-12x48ur-s Subscribe
Catalyst 3650-12x48uz-e Subscribe
Catalyst 3650-24pd-e Subscribe
Catalyst 3650-24pd-l Subscribe
Catalyst 3650-24pd-s Subscribe
Catalyst 3650-24pdm-e Subscribe
Catalyst 3650-24pdm-l Subscribe
Catalyst 3650-24pdm-s Subscribe
Catalyst 3650-24ps-e Subscribe
Catalyst 3650-24ps-l Subscribe
Catalyst 3650-24ps-s Subscribe
Catalyst 3650-24td-e Subscribe
Catalyst 3650-24td-l Subscribe
Catalyst 3650-24td-s Subscribe
Catalyst 3650-24ts-e Subscribe
Catalyst 3650-24ts-l Subscribe
Catalyst 3650-24ts-s Subscribe
Catalyst 3650-48fd-e Subscribe
Catalyst 3650-48fd-l Subscribe
Catalyst 3650-48fd-s Subscribe
Catalyst 3650-48fq-e Subscribe
Catalyst 3650-48fq-l Subscribe
Catalyst 3650-48fq-s Subscribe
Catalyst 3650-48fqm-e Subscribe
Catalyst 3650-48fqm-l Subscribe
Catalyst 3650-48fqm-s Subscribe
Catalyst 3650-48fs-e Subscribe
Catalyst 3650-48fs-l Subscribe
Catalyst 3650-48fs-s Subscribe
Catalyst 3650-48pd-e Subscribe
Catalyst 3650-48pd-l Subscribe
Catalyst 3650-48pd-s Subscribe
Catalyst 3650-48pq-e Subscribe
Catalyst 3650-48pq-l Subscribe
Catalyst 3650-48pq-s Subscribe
Catalyst 3650-48ps-e Subscribe
Catalyst 3650-48ps-l Subscribe
Catalyst 3650-48ps-s Subscribe
Catalyst 3650-48td-e Subscribe
Catalyst 3650-48td-l Subscribe
Catalyst 3650-48td-s Subscribe
Catalyst 3650-48tq-e Subscribe
Catalyst 3650-48tq-l Subscribe
Catalyst 3650-48tq-s Subscribe
Catalyst 3650-48ts-e Subscribe
Catalyst 3650-48ts-l Subscribe
Catalyst 3650-48ts-s Subscribe
Catalyst 3650-8x24uq-e Subscribe
Catalyst 3650-8x24uq-l Subscribe
Catalyst 3650-8x24uq-s Subscribe
Catalyst 3850-12s-e Subscribe
Catalyst 3850-12s-s Subscribe
Catalyst 3850-12xs-e Subscribe
Catalyst 3850-12xs-s Subscribe
Catalyst 3850-16xs-e Subscribe
Catalyst 3850-16xs-s Subscribe
Catalyst 3850-24p-e Subscribe
Catalyst 3850-24p-l Subscribe
Catalyst 3850-24p-s Subscribe
Catalyst 3850-24s-e Subscribe
Catalyst 3850-24s-s Subscribe
Catalyst 3850-24t-e Subscribe
Catalyst 3850-24t-l Subscribe
Catalyst 3850-24t-s Subscribe
Catalyst 3850-24u-e Subscribe
Catalyst 3850-24u-l Subscribe
Catalyst 3850-24u-s Subscribe
Catalyst 3850-24xs-e Subscribe
Catalyst 3850-24xs-s Subscribe
Catalyst 3850-24xu-e Subscribe
Catalyst 3850-24xu-l Subscribe
Catalyst 3850-24xu-s Subscribe
Catalyst 3850-32xs-e Subscribe
Catalyst 3850-32xs-s Subscribe
Catalyst 3850-48f-e Subscribe
Catalyst 3850-48f-l Subscribe
Catalyst 3850-48f-s Subscribe
Catalyst 3850-48p-e Subscribe
Catalyst 3850-48p-l Subscribe
Catalyst 3850-48p-s Subscribe
Catalyst 3850-48t-e Subscribe
Catalyst 3850-48t-l Subscribe
Catalyst 3850-48t-s Subscribe
Catalyst 3850-48u-e Subscribe
Catalyst 3850-48u-l Subscribe
Catalyst 3850-48u-s Subscribe
Catalyst 3850-48xs-e Subscribe
Catalyst 3850-48xs-f-e Subscribe
Catalyst 3850-48xs-f-s Subscribe
Catalyst 3850-48xs-s Subscribe
Catalyst 9300 Subscribe
Catalyst 9300-24p-a Subscribe
Catalyst 9300-24p-e Subscribe
Catalyst 9300-24t-a Subscribe
Catalyst 9300-24t-e Subscribe
Catalyst 9300-24u-a Subscribe
Catalyst 9300-24u-e Subscribe
Catalyst 9300-48p-a Subscribe
Catalyst 9300-48p-e Subscribe
Catalyst 9300-48t-a Subscribe
Catalyst 9300-48t-e Subscribe
Catalyst 9300-48u-a Subscribe
Catalyst 9300-48u-e Subscribe
Catalyst 9400 Supervisor Engine-1 Subscribe
Catalyst 9407r Subscribe
Catalyst 9410r Subscribe
Catalyst 9500 Subscribe
Catalyst C3850-12x48u-e Subscribe
Catalyst C3850-12x48u-l Subscribe
Catalyst C3850-12x48u-s Subscribe
Catalyst C9500-12q-a Subscribe
Catalyst C9500-12q-e Subscribe
Catalyst C9500-24q-a Subscribe
Catalyst C9500-24q-e Subscribe
Catalyst C9500-40x-a Subscribe
Catalyst C9500-40x-e Subscribe
Cloud Services R 1000v Subscribe
Ncs 4201 Subscribe
Ncs 4202 Subscribe
Ncs 4206 Subscribe
Ncs 4216 Subscribe
Network Convergence System 520 Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2019-4249 A vulnerability in the filesystem resource management code of Cisco IOS XE Software could allow an unauthenticated, remote attacker to exhaust filesystem resources on an affected device and cause a denial of service (DoS) condition. The vulnerability is due to ineffective management of the underlying filesystem resources. An attacker could exploit this vulnerability by performing specific actions that result in messages being sent to specific operating system log files. A successful exploit could allow the attacker to exhaust available filesystem space on an affected device. This could cause the device to crash and reload, resulting in a DoS condition for clients whose network traffic is transiting the device. Upon reload of the device, the impacted filesystem space is cleared, and the device will return to normal operation. However, continued exploitation of this vulnerability could cause subsequent forced crashes and reloads, which could lead to an extended DoS condition.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Tue, 19 Nov 2024 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-19T18:55:00.290Z

Reserved: 2019-06-04T00:00:00

Link: CVE-2019-12658

cve-icon Vulnrichment

Updated: 2024-08-04T23:24:39.227Z

cve-icon NVD

Status : Modified

Published: 2019-09-25T21:15:10.953

Modified: 2024-11-21T04:23:17.553

Link: CVE-2019-12658

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses