A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.

Project Subscriptions

Vendors Products
1000 Integrated Services Router Subscribe
1100-4g\/6g Integrated Services Router Subscribe
1100-4g Integrated Services Router Subscribe
1100-4gltegb Integrated Services Router Subscribe
1100-4gltena Integrated Services Router Subscribe
1100-4p Integrated Services Router Subscribe
1100-6g Integrated Services Router Subscribe
1100-8p Integrated Services Router Subscribe
1100-lte Integrated Services Router Subscribe
1100 Integrated Services Router Subscribe
1101-4p Integrated Services Router Subscribe
1101 Integrated Services Router Subscribe
1109-2p Integrated Services Router Subscribe
1109-4p Integrated Services Router Subscribe
1109 Integrated Services Router Subscribe
1111x-8p Integrated Services Router Subscribe
1111x Integrated Services Router Subscribe
111x Integrated Services Router Subscribe
1120 Integrated Services Router Subscribe
1131 Integrated Services Router Subscribe
1160 Integrated Services Router Subscribe
1801 Integrated Service Router Subscribe
1802 Integrated Service Router Subscribe
1803 Integrated Service Router Subscribe
1811 Integrated Service Router Subscribe
1812 Integrated Service Router Subscribe
1841 Integrated Service Router Subscribe
1861 Integrated Service Router Subscribe
1905 Integrated Services Router Subscribe
1906c Integrated Services Router Subscribe
1921 Integrated Services Router Subscribe
1941 Integrated Services Router Subscribe
1941w Integrated Services Router Subscribe
4000 Integrated Services Router Subscribe
4221 Integrated Services Router Subscribe
422 Integrated Services Router Subscribe
4321\/k9-rf Integrated Services Router Subscribe
4321\/k9-ws Integrated Services Router Subscribe
4321\/k9 Integrated Services Router Subscribe
4321 Integrated Services Router Subscribe
4331\/k9-rf Integrated Services Router Subscribe
4331\/k9-ws Integrated Services Router Subscribe
4331\/k9 Integrated Services Router Subscribe
4331 Integrated Services Router Subscribe
4351\/k9-rf Integrated Services Router Subscribe
4351\/k9-ws Integrated Services Router Subscribe
4351\/k9 Integrated Services Router Subscribe
4351 Integrated Services Router Subscribe
4431 Integrated Services Router Subscribe
44461 Integrated Services Router Subscribe
4451-x Integrated Services Router Subscribe
4451 Integrated Services Router Subscribe
4461 Integrated Services Router Subscribe
8101-32fh Subscribe
8101-32h Subscribe
8102-64h Subscribe
8201-32fh Subscribe
8800 12-slot Subscribe
8800 18-slot Subscribe
8800 4-slot Subscribe
8800 8-slot Subscribe
9800-40 Subscribe
9800-80 Subscribe
9800-cl Subscribe
Asr 1000 Subscribe
Asr 1000-esp100 Subscribe
Asr 1000-esp100-x Subscribe
Asr 1000-esp200-x Subscribe
Asr 1000-x Subscribe
Asr 1001 Subscribe
Asr 1001-hx Subscribe
Asr 1001-hx R Subscribe
Asr 1001-x Subscribe
Asr 1001-x R Subscribe
Asr 1002 Subscribe
Asr 1002-hx Subscribe
Asr 1002-hx R Subscribe
Asr 1002-x Subscribe
Asr 1002-x R Subscribe
Asr 1004 Subscribe
Asr 1006 Subscribe
Asr 1006-x Subscribe
Asr 1009-x Subscribe
Asr 1013 Subscribe
Asr 1023 Subscribe
Asr 900 Subscribe
Asr 901-12c-f-d Subscribe
Asr 901-12c-ft-d Subscribe
Asr 901-4c-f-d Subscribe
Asr 901-4c-ft-d Subscribe
Asr 901-6cz-f-a Subscribe
Asr 901-6cz-f-d Subscribe
Asr 901-6cz-fs-a Subscribe
Asr 901-6cz-fs-d Subscribe
Asr 901-6cz-ft-a Subscribe
Asr 901-6cz-ft-d Subscribe
Asr 901s-2sg-f-ah Subscribe
Asr 901s-2sg-f-d Subscribe
Asr 901s-3sg-f-ah Subscribe
Asr 901s-3sg-f-d Subscribe
Asr 901s-4sg-f-d Subscribe
Asr 902 Subscribe
Asr 902u Subscribe
Catalyst 8200 Subscribe
Catalyst 8300 Subscribe
Catalyst 8300-1n1s-4t2x Subscribe
Catalyst 8300-1n1s-6t Subscribe
Catalyst 8300-2n2s-4t2x Subscribe
Catalyst 8300-2n2s-6t Subscribe
Catalyst 8500 Subscribe
Catalyst 8500-4qc Subscribe
Catalyst 8500l Subscribe
Catalyst 8510csr Subscribe
Catalyst 8510msr Subscribe
Catalyst 8540csr Subscribe
Catalyst 8540msr Subscribe
Catalyst 9200 Subscribe
Catalyst 9200cx Subscribe
Catalyst 9200l Subscribe
Catalyst 9300 Subscribe
Catalyst 9300-24p-a Subscribe
Catalyst 9300-24p-e Subscribe
Catalyst 9300-24s-a Subscribe
Catalyst 9300-24s-e Subscribe
Catalyst 9300-24t-a Subscribe
Catalyst 9300-24t-e Subscribe
Catalyst 9300-24u-a Subscribe
Catalyst 9300-24u-e Subscribe
Catalyst 9300-24ux-a Subscribe
Catalyst 9300-24ux-e Subscribe
Catalyst 9300-48p-a Subscribe
Catalyst 9300-48p-e Subscribe
Catalyst 9300-48s-a Subscribe
Catalyst 9300-48s-e Subscribe
Catalyst 9300-48t-a Subscribe
Catalyst 9300-48t-e Subscribe
Catalyst 9300-48u-a Subscribe
Catalyst 9300-48u-e Subscribe
Catalyst 9300-48un-a Subscribe
Catalyst 9300-48un-e Subscribe
Catalyst 9300-48uxm-a Subscribe
Catalyst 9300-48uxm-e Subscribe
Catalyst 9300l Subscribe
Catalyst 9300l-24p-4g-a Subscribe
Catalyst 9300l-24p-4g-e Subscribe
Catalyst 9300l-24p-4x-a Subscribe
Catalyst 9300l-24p-4x-e Subscribe
Catalyst 9300l-24t-4g-a Subscribe
Catalyst 9300l-24t-4g-e Subscribe
Catalyst 9300l-24t-4x-a Subscribe
Catalyst 9300l-24t-4x-e Subscribe
Catalyst 9300l-48p-4g-a Subscribe
Catalyst 9300l-48p-4g-e Subscribe
Catalyst 9300l-48p-4x-a Subscribe
Catalyst 9300l-48p-4x-e Subscribe
Catalyst 9300l-48t-4g-a Subscribe
Catalyst 9300l-48t-4g-e Subscribe
Catalyst 9300l-48t-4x-a Subscribe
Catalyst 9300l-48t-4x-e Subscribe
Catalyst 9300l Stack Subscribe
Catalyst 9300lm Subscribe
Catalyst 9300x Subscribe
Catalyst 9400 Subscribe
Catalyst 9400 Supervisor Engine-1 Subscribe
Catalyst 9407r Subscribe
Catalyst 9410r Subscribe
Catalyst 9500 Subscribe
Catalyst 9500h Subscribe
Catalyst 9600 Subscribe
Catalyst 9600 Supervisor Engine-1 Subscribe
Catalyst 9600x Subscribe
Catalyst 9800 Subscribe
Catalyst 9800-40 Subscribe
Catalyst 9800-80 Subscribe
Catalyst 9800-cl Subscribe
Catalyst 9800-l Subscribe
Catalyst 9800-l-c Subscribe
Catalyst 9800-l-f Subscribe
Catalyst Ie3200 Rugged Switch Subscribe
Catalyst Ie3300 Rugged Switch Subscribe
Cloud Services Router 1000v Subscribe
Esr-6300-con-k9 Subscribe
Esr-6300-ncp-k9 Subscribe
Integrated Services Virtual Router Subscribe
Network Convergence System 520 Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2017-3892 A vulnerability in the Border Gateway Protocol (BGP) over an Ethernet Virtual Private Network (EVPN) for Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload, resulting in a denial of service (DoS) condition, or potentially corrupt the BGP routing table, which could result in network instability. The vulnerability exists due to changes in the implementation of the BGP MPLS-Based Ethernet VPN RFC (RFC 7432) draft between IOS XE software releases. When the BGP Inclusive Multicast Ethernet Tag Route or BGP EVPN MAC/IP Advertisement Route update packet is received, it could be possible that the IP address length field is miscalculated. An attacker could exploit this vulnerability by sending a crafted BGP packet to an affected device after the BGP session was established. An exploit could allow the attacker to cause the affected device to reload or corrupt the BGP routing table; either outcome would result in a DoS. The vulnerability may be triggered when the router receives a crafted BGP message from a peer on an existing BGP session. This vulnerability affects all releases of Cisco IOS XE Software prior to software release 16.3 that support BGP EVPN configurations. If the device is not configured for EVPN, it is not vulnerable. Cisco Bug IDs: CSCui67191, CSCvg52875.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 22 Oct 2025 00:15:00 +0000


Tue, 21 Oct 2025 20:30:00 +0000


Tue, 21 Oct 2025 19:30:00 +0000


Fri, 15 Nov 2024 18:15:00 +0000

Type Values Removed Values Added
Metrics kev

{'dateAdded': '2022-03-03'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'active', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2026-01-12T21:47:59.350Z

Reserved: 2017-08-03T00:00:00.000Z

Link: CVE-2017-12319

cve-icon Vulnrichment

Updated: 2024-08-05T18:36:55.657Z

cve-icon NVD

Status : Analyzed

Published: 2018-03-27T09:29:00.280

Modified: 2026-01-13T22:20:14.280

Link: CVE-2017-12319

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses