Advisory ID: NCC-CSIRT-1228-064
Summary: The PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco Internetworking Operating System (IOS) Software has a vulnerability in its implementation. An unauthenticated, remote attacker can exploit the vulnerability to force a reload on a vulnerable device, launching a denial of service (DoS) attack.
Vulnerable Platform(s): Cisco Internetworking Operating System (IOS)
Threat Type:
- Vulnerability
Product : Cisco devices
Version: All version of Cisco devices running IOS Software configured to process PROFINET messages
Description: The vulnerability results from incorrectly processing incoming PN-DCP identify request packets that are directed at an affected device. An attacker could take advantage of this vulnerability by delivering a specially crafted PN-DCP Identify Request packet to a vulnerable device before sending it more normal PN-DCP Identify Request packets. In the event of a successful exploit, the attacker might be able to trigger a DoS condition by forcing the reload of the affected device.
Consquences:
Exploitation of this vulnerability will cause an affected device to reload and generate a core file (a core file is an image of a process that has crashed). This led to Denial-of-Service condition.
Impact/Probability: HIGH/HIGH
Solution :
- Cisco customers should only use software versions and feature sets for which they have paid a license in order to install them and expect support for them.
- When considering software upgrades, customers are urged to frequently review the Cisco product advisories, which are accessible via the vendor's website, while thinking about software upgrades.