Some device EVPN configurations, such as the load-balancing-mode port-active configuration, can also cause devices to be vulnerable without specific L2VPN configurations.
#CISCO IOS XE BGP GRACEFUL RESTART SOFTWARE#
These vulnerabilities affect Cisco devices if they are running a vulnerable release of Cisco IOS XR Software later than 6.6.1 and are configured for BGP on a device with the L2VPN EVPN address family. This advisory is available at the following link: There are no workarounds that address these vulnerabilities.
#CISCO IOS XE BGP GRACEFUL RESTART UPDATE#
To exploit these vulnerabilities, the malicious BGP update message would need to come from a configured, valid BGP peer, or would need to be injected by the attacker into the victim's BGP network on an existing, valid TCP connection to a BGP peer.Ĭisco has released software updates that address these vulnerabilities. The Cisco implementation of BGP accepts incoming BGP traffic only from explicitly defined peers. A successful exploit could allow the attacker to cause the BGP process to restart unexpectedly, resulting in a DoS condition. An attacker could exploit these vulnerabilities by sending BGP EVPN update messages with malformed attributes to be processed by an affected system. The vulnerabilities are due to incorrect processing of BGP update messages that contain crafted EVPN attributes. Multiple vulnerabilities in the implementation of Border Gateway Protocol (BGP) Ethernet VPN (EVPN) functionality in Cisco IOS XR Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition.