Group Encrypted Transport VPN (GET VPN).Cisco 4000 Series Integrated Services Routers:Ĭisco IOS XE Software is affected by this vulnerability if the system is configured to terminate IPsec VPN connections.Cisco ASR 1000 Series 200-Gbps Embedded Service Processor (ASR1000-ESP200).Cisco ASR 1000 Series 100-Gbps Embedded Service Processor (ASR1000-ESP100).Cisco ASR 1000 Series Aggregation Services Routers:.This vulnerability affects Cisco IOS XE Software running on the following products. For a complete list of the advisories and links to them, see Cisco Event Response: September 2018 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication. This advisory is part of the September 26, 2018, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. This advisory is available at the following link:
There are no workarounds that address this vulnerability. An exploit could allow the attacker to cause a reload of the affected device.Ĭisco has released software updates that address this vulnerability. An attacker could exploit this vulnerability by sending malformed IPsec packets to be processed by an affected device. The vulnerability is due to improper processing of malformed IPsec Authentication Header (AH) or Encapsulating Security Payload (ESP) packets.
A vulnerability in the IPsec driver code of multiple Cisco IOS XE Software platforms and the Cisco ASA 5500-X Series Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause the device to reload.