Thursday September 19, 2024

Advisory ID: NCC-CSIRT-1228-064

Summary: The PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco Internetworking Operating System (IOS) Software has a vulnerability in its implementation. An unauthenticated, remote attacker can exploit the vulnerability to force a reload on a vulnerable device, launching a denial of service (DoS) attack.

Vulnerable Platform(s):  Cisco Internetworking Operating System (IOS)

Threat Type:  

  • Vulnerability

Product :  Cisco devices 

Version:   All version of Cisco devices running IOS Software configured to process PROFINET messages 

Description: The vulnerability results from incorrectly processing incoming PN-DCP identify request packets that are directed at an affected device. An attacker could take advantage of this vulnerability by delivering a specially crafted PN-DCP Identify Request packet to a vulnerable device before sending it more normal PN-DCP Identify Request packets. In the event of a successful exploit, the attacker might be able to trigger a DoS condition by forcing the reload of the affected device.

Consquences:  

Exploitation of this vulnerability will cause an affected device to reload and generate a core file (a core file is an image of a process that has crashed). This led to Denial-of-Service condition.

Impact/Probability: HIGH/HIGH

Solution :
  • Cisco customers should only use software versions and feature sets for which they have paid a license in order to install them and expect support for them.
  • When considering software upgrades, customers are urged to frequently review the Cisco product advisories, which are accessible via the vendor's website, while thinking about software upgrades.
References: