{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2021-1440","assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","state":"PUBLISHED","assignerShortName":"cisco","dateReserved":"2020-11-13T00:00:00.000Z","datePublished":"2024-11-18T15:34:27.378Z","dateUpdated":"2024-11-18T15:51:25.688Z"},"containers":{"cna":{"title":"Cisco IOS XR Software BGP Resource Public Key Infrastructure Denial of Service Vulnerability","metrics":[{"format":"cvssV3_1","cvssV3_1":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H","baseScore":6.8,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}}],"descriptions":[{"lang":"en","value":"A vulnerability in the implementation of the Resource Public Key Infrastructure (RPKI) feature of Cisco&nbsp;IOS XR Software could allow an unauthenticated, remote attacker to cause the Border Gateway Protocol (BGP) process to crash, resulting in a denial of service (DoS) condition.\r\nThis vulnerability is due to the incorrect handling of a specific RPKI to Router (RTR) Protocol packet header. An attacker could exploit this vulnerability by compromising the RPKI validator server and sending a specifically crafted RTR packet to an affected device. Alternatively, the attacker could use man-in-the-middle techniques to impersonate the RPKI validator server and send a specifically crafted RTR response packet over the established RTR TCP connection to the affected device. A successful exploit could allow the attacker to cause a DoS condition because the BGP process could constantly restart and BGP routing could become unstable.Cisco&nbsp;has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2021 release of the Cisco&nbsp;IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see ."}],"references":[{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-xrbgp-rpki-dos-gvmjqxbk","name":"cisco-sa-xrbgp-rpki-dos-gvmjqxbk"},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM","name":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-asaftd-xss-webui-gQLSFyPM</a></p><p>This advisory is part of the October 2021 release of the Cisco&nbsp;ASA, FTD, and FMC Security Advisory Bundled publication. For a complete list of the advisories and links to them, see <a href=\"https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74773\">Cisco&nbsp;Event Response: October 2021 Cisco&nbsp;ASA, FMC, and FTD Software Security Advisory Bundled Publication"},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk","name":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-sdwan-sigverbypass-gPYXd6Mk"},{"url":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ","name":"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-esa-sma-info-disclo-VOu2GHbZ"}],"exploits":[{"lang":"en","value":"The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory."}],"source":{"advisory":"cisco-sa-xrbgp-rpki-dos-gvmjqxbk","discovery":"EXTERNAL","defects":["CSCvx04451"]},"problemTypes":[{"descriptions":[{"lang":"en","description":"Reachable Assertion","type":"cwe","cweId":"CWE-617"}]}],"affected":[{"vendor":"Cisco","product":"Cisco IOS XR Software","versions":[{"version":"6.6.1","status":"affected"},{"version":"6.5.3","status":"affected"},{"version":"7.0.1","status":"affected"},{"version":"6.6.11","status":"affected"},{"version":"6.5.1","status":"affected"},{"version":"6.5.2","status":"affected"},{"version":"6.6.2","status":"affected"},{"version":"6.6.12","status":"affected"},{"version":"6.6.25","status":"affected"},{"version":"7.1.1","status":"affected"},{"version":"7.0.90","status":"affected"},{"version":"6.6.3","status":"affected"},{"version":"7.0.2","status":"affected"},{"version":"7.1.2","status":"affected"},{"version":"7.2.1","status":"affected"},{"version":"7.0.11","status":"affected"},{"version":"7.0.12","status":"affected"},{"version":"7.0.14","status":"affected"},{"version":"6.6.4","status":"affected"},{"version":"7.2.12","status":"affected"},{"version":"7.2.2","status":"affected"}],"defaultStatus":"unknown"}],"providerMetadata":{"orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco","dateUpdated":"2024-11-18T15:34:27.378Z"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2024-11-18T15:51:07.818992Z","id":"CVE-2021-1440","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-11-18T15:51:25.688Z"}}]}}