CVE-2021-1446 Detail

Current Description

A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a logic error that occurs when an affected device inspects certain DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through an affected device that is performing NAT for DNS packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability can be exploited only by traffic that is sent through an affected device via IPv4 packets. The vulnerability cannot be exploited via IPv6 traffic.

View Analysis Description

Analysis Description

A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a logic error that occurs when an affected device inspects certain DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through an affected device that is performing NAT for DNS packets. A successful exploit could allow an attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability can be exploited only by traffic that is sent through an affected device via IPv4 packets. The vulnerability cannot be exploited via IPv6 traffic.

Severity

CVSS 3.x Severity and Metrics:

CVSS 2.0 Severity and Metrics:

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to [email protected].

Weakness Enumeration

CWE-ID CWE Name Source
CWE-754 Improper Check for Unusual or Exceptional Conditions Cisco Systems, Inc.  

Change History

2 change records found show changes

Initial Analysis 3/29/2021 2:59:44 PM

Action Type Old Value New Value
Added CPE Configuration Record truncated, showing 500 of 13561 characters.
View Entire Change Record

OR
     *cpe:2.3:o:cisco:ios_xe:3.7.0bs:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.7.0s:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.7.0xas:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.7.0xbs:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.7.1as:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.7.1s:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.7.2s:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.7.2ts:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.7.3s:*:*:*:*:*:*:*
     *cpe:2.3:o:cisco:ios_xe:3.7.4as:*:*
Added CVSS V2
NIST (AV:N/AC:M/Au:N/C:N/I:N/A:C)
Added CVSS V3.1
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Changed Reference Type
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alg-dos-hbBS7SZE No Types Assigned
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-alg-dos-hbBS7SZE Vendor Advisory

CVE Modified by Cisco Systems, Inc. 3/24/2021 5:15:14 PM

Action Type Old Value New Value
Changed Description Record truncated, showing 500 of 796 characters.
View Entire Change Record

 A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.
 The vulnerability is due to a logic error that occurs when an affected device inspects certain DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through an affected device that is performing NAT for DNS packets. A successful exploi
Record truncated, showing 500 of 790 characters.
View Entire Change Record

A vulnerability in the DNS application layer gateway (ALG) functionality used by Network Address Translation (NAT) in Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a logic error that occurs when an affected device inspects certain DNS packets. An attacker could exploit this vulnerability by sending crafted DNS packets through an affected device that is performing NAT for DNS packets. A successful exploit c

Quick Info

CVE Dictionary Entry:
CVE-2021-1446
NVD Published Date:
03/24/2021
NVD Last Modified:
03/29/2021
Source:
Cisco Systems, Inc.