Cisco IOS and IOS XE Software ARP Resource Management Exhaustion Denial of Service Vulnerability
Cisco Security Advisory
Emergency Support:
+1 877 228 7302 (toll-free within North America)
+1 408 525 6532 (International direct-dial)
Non-emergency Support:
Email: psirt@cisco.com
Support requests that are received via e-mail are typically acknowledged within 48 hours.
Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.
More information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html
cisco-sa-arp-mtfhBfjE
Final
1.0
1.0
2021-03-17T13:27:14
Initial public release.
2021-03-24T16:00:00
2021-03-24T16:00:00
TVCE
A vulnerability in Address Resolution Protocol (ARP) management of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to prevent an affected device from resolving ARP entries for legitimate hosts on the connected subnets.
This vulnerability exists because ARP entries are mismanaged. An attacker could exploit this vulnerability by continuously sending traffic that results in incomplete ARP entries. A successful exploit could allow the attacker to cause ARP requests on the device to be unsuccessful for legitimate hosts, resulting in a denial of service (DoS) condition.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arp-mtfhBfjE ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arp-mtfhBfjE"]
At the time of publication, this vulnerability affected Cisco devices if they were running a vulnerable release of Cisco IOS or IOS XE Software.
For information about which Cisco software releases are vulnerable, see the Fixed Software ["#fs"] section of this advisory.
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect the following Cisco Products:
IOS XR Software
NX-OS Software
There are no workarounds that address this vulnerability.
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Cisco IOS and IOS XE Software
To help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker ["https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"] to identify any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (“First Fixed”). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (“Combined First Fixed”).
Customers can use the Cisco Software Checker ["https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"] to search advisories in the following ways:
Choose the software and one or more releases
Upload a .txt file that includes a list of specific releases
Enter the output of the show version command
After initiating a search, customers can customize the search to include all Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication.
Customers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE Software release—for example, 15.1(4)M2 or 3.13.8S:
By default, the Cisco Software Checker ["https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"] includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker on Cisco.com and check the Medium check box in the drop-down list under Impact Rating when customizing a search.
For a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes ["https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032"], Cisco IOS XE 3S Release Notes ["https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754"], or Cisco IOS XE 3SG Release Notes ["https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252"], depending on the Cisco IOS XE Software release.
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
This vulnerability was found during the resolution of a Cisco TAC support case.
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arp-mtfhBfjE
Cisco IOS and IOS XE Software ARP Resource Management Exhaustion Denial of Service Vulnerability
Cisco IOS 15.2(2)E6
Cisco IOS 15.2(5)E1
Cisco IOS 15.2(3)E5
Cisco IOS 15.2(5a)E1
Cisco IOS 15.2(4)E4
Cisco IOS 15.2(2)E7
Cisco IOS 15.2(5)E2
Cisco IOS 15.2(6)E
Cisco IOS 15.2(5)E2b
Cisco IOS 15.2(4)E5
Cisco IOS 15.2(5)E2c
Cisco IOS 15.2(2)E8
Cisco IOS 15.2(6)E0a
Cisco IOS 15.2(6)E1
Cisco IOS 15.2(2)E7b
Cisco IOS 15.2(4)E5a
Cisco IOS 15.2(6)E0c
Cisco IOS 15.2(4)E6
Cisco IOS 15.2(6)E2
Cisco IOS 15.2(2)E9
Cisco IOS 15.2(6)E1a
Cisco IOS 15.2(4)E7
Cisco IOS 15.2(6)E1s
Cisco IOS 15.2(7)E
Cisco IOS 15.2(2)E10
Cisco IOS 15.2(4)E8
Cisco IOS 15.2(2)E9a
Cisco IOS 15.2(6)E2a
Cisco IOS 15.2(6)E2b
Cisco IOS 15.2(7)E1
Cisco IOS 15.2(7)E0a
Cisco IOS 15.2(7)E0b
Cisco IOS 15.2(7)E0s
Cisco IOS 15.2(6)E3
Cisco IOS 15.2(4)E9
Cisco IOS 15.2(7)E2
Cisco IOS 15.2(7a)E0b
Cisco IOS 15.2(4)E10
Cisco IOS 15.2(7)E3
Cisco IOS 15.2(7)E1a
Cisco IOS 15.2(7b)E0b
Cisco IOS 15.2(7)E2a
Cisco IOS 15.2(4)E10a
Cisco IOS 15.2(7)E2b
Cisco IOS 15.2(5)EX
Cisco IOS 15.2(4)JBX
Cisco IOS 15.5(3)S4
Cisco IOS 15.5(3)S5
Cisco IOS 15.5(3)S6
Cisco IOS 15.5(3)S6a
Cisco IOS 15.5(3)S7
Cisco IOS 15.5(3)S6b
Cisco IOS 15.5(3)S8
Cisco IOS 15.5(3)S9
Cisco IOS 15.5(3)S10
Cisco IOS 15.5(3)S9a
Cisco IOS 15.5(3)S10a
Cisco IOS 15.2(6)EB
Cisco IOS 15.2(4)EA6
Cisco IOS 15.2(4)EA7
Cisco IOS 15.2(4)EA8
Cisco IOS 15.2(4)EA9
Cisco IOS 15.2(4)EA9a
Cisco IOS 15.2(4)EA10
Cisco IOS 15.5(3)M4
Cisco IOS 15.5(3)M4a
Cisco IOS 15.5(3)M5
Cisco IOS 15.5(3)M4b
Cisco IOS 15.5(3)M4c
Cisco IOS 15.5(3)M6
Cisco IOS 15.5(3)M7
Cisco IOS 15.5(3)M6a
Cisco IOS 15.5(3)M8
Cisco IOS 15.5(3)M9
Cisco IOS 15.5(3)M10
Cisco IOS 15.5(3)M11
Cisco IOS 15.6(3)M2
Cisco IOS 15.6(3)M2a
Cisco IOS 15.6(3)M3
Cisco IOS 15.6(3)M3a
Cisco IOS 15.6(3)M4
Cisco IOS 15.6(3)M5
Cisco IOS 15.6(3)M6
Cisco IOS 15.6(3)M7
Cisco IOS 15.6(3)M6a
Cisco IOS 15.6(3)M6b
Cisco IOS 15.6(3)M8
Cisco IOS 15.6(3)M9
Cisco IOS 15.3(3)JPC97
Cisco IOS 15.4(1)SY
Cisco IOS 15.4(1)SY1
Cisco IOS 15.4(1)SY2
Cisco IOS 15.4(1)SY3
Cisco IOS 15.4(1)SY4
Cisco IOS 15.5(1)SY
Cisco IOS 15.5(1)SY1
Cisco IOS 15.5(1)SY2
Cisco IOS 15.5(1)SY3
Cisco IOS 15.5(1)SY4
Cisco IOS 15.5(1)SY5
Cisco IOS 15.5(1)SY6
Cisco IOS 15.7(3)M
Cisco IOS 15.7(3)M1
Cisco IOS 15.7(3)M0a
Cisco IOS 15.7(3)M3
Cisco IOS 15.7(3)M2
Cisco IOS 15.7(3)M4
Cisco IOS 15.7(3)M5
Cisco IOS 15.7(3)M4a
Cisco IOS 15.7(3)M4b
Cisco IOS 15.7(3)M6
Cisco IOS 15.7(3)M7
Cisco IOS 15.8(3)M
Cisco IOS 15.8(3)M1
Cisco IOS 15.8(3)M0a
Cisco IOS 15.8(3)M0b
Cisco IOS 15.8(3)M2
Cisco IOS 15.8(3)M1a
Cisco IOS 15.8(3)M3
Cisco IOS 15.8(3)M2a
Cisco IOS 15.8(3)M4
Cisco IOS 15.8(3)M3a
Cisco IOS 15.8(3)M3b
Cisco IOS 15.8(3)M5
Cisco IOS 12.2(6)I1
Cisco IOS 15.9(3)M
Cisco IOS 15.9(3)M1
Cisco IOS 15.9(3)M0a
Cisco IOS 15.9(3)M2
Cisco IOS 15.9(3)M2a
Cisco IOS 15.1(3)SVR1
Cisco IOS 15.1(3)SVR2
Cisco IOS 15.1(3)SVR3
Cisco IOS 15.1(3)SVS
Cisco IOS 15.1(3)SVS1
Cisco IOS
Cisco IOS XE Software 3.6.6E
Cisco IOS XE Software 3.6.7E
Cisco IOS XE Software 3.6.8E
Cisco IOS XE Software 3.6.7aE
Cisco IOS XE Software 3.6.7bE
Cisco IOS XE Software 3.6.9E
Cisco IOS XE Software 3.6.10E
Cisco IOS XE Software 3.6.9aE
Cisco IOS XE Software 3.7.5E
Cisco IOS XE Software 3.16.4S
Cisco IOS XE Software 3.16.4aS
Cisco IOS XE Software 3.16.4bS
Cisco IOS XE Software 3.16.4gS
Cisco IOS XE Software 3.16.5S
Cisco IOS XE Software 3.16.4cS
Cisco IOS XE Software 3.16.4dS
Cisco IOS XE Software 3.16.4eS
Cisco IOS XE Software 3.16.6S
Cisco IOS XE Software 3.16.5aS
Cisco IOS XE Software 3.16.5bS
Cisco IOS XE Software 3.16.7S
Cisco IOS XE Software 3.16.6bS
Cisco IOS XE Software 3.16.7aS
Cisco IOS XE Software 3.16.7bS
Cisco IOS XE Software 3.16.8S
Cisco IOS XE Software 3.16.9S
Cisco IOS XE Software 3.16.10S
Cisco IOS XE Software 3.16.10aS
Cisco IOS XE Software 3.8.4E
Cisco IOS XE Software 3.8.5E
Cisco IOS XE Software 3.8.5aE
Cisco IOS XE Software 3.8.6E
Cisco IOS XE Software 3.8.7E
Cisco IOS XE Software 3.8.8E
Cisco IOS XE Software 3.8.9E
Cisco IOS XE Software 3.8.10E
Cisco IOS XE Software 16.3.2
Cisco IOS XE Software 16.3.3
Cisco IOS XE Software 16.3.4
Cisco IOS XE Software 16.3.5
Cisco IOS XE Software 16.3.5b
Cisco IOS XE Software 16.3.6
Cisco IOS XE Software 16.3.7
Cisco IOS XE Software 16.3.8
Cisco IOS XE Software 16.3.9
Cisco IOS XE Software 16.3.10
Cisco IOS XE Software 16.3.11
Cisco IOS XE Software 16.4.1
Cisco IOS XE Software 16.4.2
Cisco IOS XE Software 16.4.3
Cisco IOS XE Software 16.5.1
Cisco IOS XE Software 16.5.1a
Cisco IOS XE Software 16.5.1b
Cisco IOS XE Software 16.5.2
Cisco IOS XE Software 16.5.3
Cisco IOS XE Software 3.9.1E
Cisco IOS XE Software 3.9.2E
Cisco IOS XE Software 3.9.2bE
Cisco IOS XE Software 16.6.1
Cisco IOS XE Software 16.6.2
Cisco IOS XE Software 16.6.3
Cisco IOS XE Software 16.6.4
Cisco IOS XE Software 16.6.5
Cisco IOS XE Software 16.6.4s
Cisco IOS XE Software 16.6.4a
Cisco IOS XE Software 16.6.5a
Cisco IOS XE Software 16.6.6
Cisco IOS XE Software 16.6.5b
Cisco IOS XE Software 16.6.7
Cisco IOS XE Software 16.6.7a
Cisco IOS XE Software 16.6.8
Cisco IOS XE Software 16.7.1
Cisco IOS XE Software 16.7.1a
Cisco IOS XE Software 16.7.1b
Cisco IOS XE Software 16.7.2
Cisco IOS XE Software 16.7.3
Cisco IOS XE Software 16.7.4
Cisco IOS XE Software 16.8.1
Cisco IOS XE Software 16.8.1a
Cisco IOS XE Software 16.8.1b
Cisco IOS XE Software 16.8.1s
Cisco IOS XE Software 16.8.1c
Cisco IOS XE Software 16.8.1d
Cisco IOS XE Software 16.8.2
Cisco IOS XE Software 16.8.1e
Cisco IOS XE Software 16.8.3
Cisco IOS XE Software 16.9.1
Cisco IOS XE Software 16.9.2
Cisco IOS XE Software 16.9.1a
Cisco IOS XE Software 16.9.1b
Cisco IOS XE Software 16.9.1s
Cisco IOS XE Software 16.9.1c
Cisco IOS XE Software 16.9.1d
Cisco IOS XE Software 16.9.3
Cisco IOS XE Software 16.9.2a
Cisco IOS XE Software 16.9.2s
Cisco IOS XE Software 16.9.3h
Cisco IOS XE Software 16.9.4
Cisco IOS XE Software 16.9.3s
Cisco IOS XE Software 16.9.3a
Cisco IOS XE Software 16.9.4c
Cisco IOS XE Software 16.9.5
Cisco IOS XE Software 16.9.5f
Cisco IOS XE Software 16.9.6
Cisco IOS XE Software 16.10.1
Cisco IOS XE Software 16.10.1a
Cisco IOS XE Software 16.10.1b
Cisco IOS XE Software 16.10.1s
Cisco IOS XE Software 16.10.1c
Cisco IOS XE Software 16.10.1e
Cisco IOS XE Software 16.10.1d
Cisco IOS XE Software 16.10.2
Cisco IOS XE Software 16.10.1f
Cisco IOS XE Software 16.10.1g
Cisco IOS XE Software 16.10.3
Cisco IOS XE Software 3.10.0E
Cisco IOS XE Software 3.10.1E
Cisco IOS XE Software 3.10.0cE
Cisco IOS XE Software 3.10.2E
Cisco IOS XE Software 3.10.1aE
Cisco IOS XE Software 3.10.1sE
Cisco IOS XE Software 3.10.3E
Cisco IOS XE Software 16.11.1
Cisco IOS XE Software 16.11.1a
Cisco IOS XE Software 16.11.1b
Cisco IOS XE Software 16.11.2
Cisco IOS XE Software 16.11.1s
Cisco IOS XE Software 16.11.1c
Cisco IOS XE Software 16.12.1
Cisco IOS XE Software 16.12.1s
Cisco IOS XE Software 16.12.1a
Cisco IOS XE Software 16.12.1c
Cisco IOS XE Software 16.12.1w
Cisco IOS XE Software 16.12.2
Cisco IOS XE Software 16.12.1y
Cisco IOS XE Software 16.12.2a
Cisco IOS XE Software 16.12.3
Cisco IOS XE Software 16.12.2s
Cisco IOS XE Software 16.12.1x
Cisco IOS XE Software 16.12.1t
Cisco IOS XE Software 16.12.2t
Cisco IOS XE Software 16.12.4
Cisco IOS XE Software 16.12.3s
Cisco IOS XE Software 16.12.1z
Cisco IOS XE Software 16.12.3a
Cisco IOS XE Software 16.12.4a
Cisco IOS XE Software 3.11.0E
Cisco IOS XE Software 3.11.1E
Cisco IOS XE Software 3.11.2E
Cisco IOS XE Software 3.11.3E
Cisco IOS XE Software 3.11.1aE
Cisco IOS XE Software 3.11.2aE
Cisco IOS XE Software 3.11.3aE
Cisco IOS XE Software 17.1.1
Cisco IOS XE Software 17.1.1a
Cisco IOS XE Software 17.1.1s
Cisco IOS XE Software 17.1.2
Cisco IOS XE Software 17.1.1t
Cisco IOS XE Software 17.2.1
Cisco IOS XE Software 17.2.1r
Cisco IOS XE Software 17.2.1a
Cisco IOS XE Software 17.2.1v
Cisco IOS XE Software 17.2.2
Cisco IOS XE Software 17.3.1
Cisco IOS XE Software 17.3.2
Cisco IOS XE Software 17.3.1a
Cisco IOS XE Software 17.3.1w
Cisco IOS XE Software 17.3.2a
Cisco IOS XE Software
ARP resolution not triggered for transit traffic due to punted packet being dropped in CEF layer
CSCvv75175
CSCvv75175
Complete.
CVE-2021-1377
CVRFPID-195032
CVRFPID-2097
CVRFPID-217807
CVRFPID-218891
CVRFPID-218996
CVRFPID-218997
CVRFPID-220441
CVRFPID-220594
CVRFPID-221093
CVRFPID-222275
CVRFPID-222530
CVRFPID-222988
CVRFPID-222989
CVRFPID-223085
CVRFPID-223143
CVRFPID-223189
CVRFPID-224553
CVRFPID-224611
CVRFPID-224868
CVRFPID-225155
CVRFPID-225407
CVRFPID-225667
CVRFPID-225740
CVRFPID-225786
CVRFPID-227110
CVRFPID-227172
CVRFPID-227598
CVRFPID-227754
CVRFPID-227959
CVRFPID-228056
CVRFPID-228075
CVRFPID-228142
CVRFPID-228151
CVRFPID-228191
CVRFPID-228693
CVRFPID-228957
CVRFPID-228958
CVRFPID-228959
CVRFPID-228965
CVRFPID-228973
CVRFPID-230587
CVRFPID-230591
CVRFPID-230592
CVRFPID-230609
CVRFPID-230611
CVRFPID-230624
CVRFPID-230990
CVRFPID-230992
CVRFPID-230997
CVRFPID-231074
CVRFPID-231245
CVRFPID-231471
CVRFPID-231509
CVRFPID-231510
CVRFPID-231862
CVRFPID-232007
CVRFPID-232765
CVRFPID-233072
CVRFPID-233073
CVRFPID-233074
CVRFPID-238999
CVRFPID-239053
CVRFPID-240186
CVRFPID-240653
CVRFPID-241614
CVRFPID-242313
CVRFPID-243144
CVRFPID-243311
CVRFPID-243330
CVRFPID-244068
CVRFPID-244069
CVRFPID-244520
CVRFPID-244911
CVRFPID-245095
CVRFPID-245741
CVRFPID-246497
CVRFPID-247572
CVRFPID-247630
CVRFPID-247679
CVRFPID-248832
CVRFPID-250278
CVRFPID-251487
CVRFPID-252162
CVRFPID-252911
CVRFPID-254193
CVRFPID-256165
CVRFPID-256429
CVRFPID-256430
CVRFPID-257349
CVRFPID-257830
CVRFPID-258423
CVRFPID-258582
CVRFPID-258583
CVRFPID-259867
CVRFPID-259870
CVRFPID-260802
CVRFPID-260803
CVRFPID-260804
CVRFPID-260993
CVRFPID-262300
CVRFPID-262684
CVRFPID-263803
CVRFPID-264643
CVRFPID-264952
CVRFPID-267065
CVRFPID-267415
CVRFPID-267421
CVRFPID-268474
CVRFPID-268969
CVRFPID-270096
CVRFPID-271140
CVRFPID-271286
CVRFPID-271631
CVRFPID-271796
CVRFPID-271797
CVRFPID-273573
CVRFPID-274038
CVRFPID-274204
CVRFPID-276534
CVRFPID-276903
CVRFPID-277095
CVRFPID-277097
CVRFPID-277098
CVRFPID-277205
CVRFPID-277230
CVRFPID-277232
CVRFPID-277253
CVRFPID-277254
CVRFPID-277353
CVRFPID-278029
CVRFPID-278031
CVRFPID-278403
CVRFPID-279335
CVRFPID-279337
CVRFPID-279380
CVRFPID-279383
CVRFPID-214051
CVRFPID-217255
CVRFPID-217256
CVRFPID-217257
CVRFPID-217259
CVRFPID-217267
CVRFPID-218901
CVRFPID-218903
CVRFPID-218905
CVRFPID-220290
CVRFPID-220357
CVRFPID-220993
CVRFPID-222257
CVRFPID-222483
CVRFPID-222693
CVRFPID-222694
CVRFPID-222695
CVRFPID-222711
CVRFPID-222925
CVRFPID-223252
CVRFPID-224702
CVRFPID-224840
CVRFPID-225099
CVRFPID-225466
CVRFPID-225784
CVRFPID-225832
CVRFPID-225856
CVRFPID-225858
CVRFPID-226158
CVRFPID-226330
CVRFPID-226331
CVRFPID-227555
CVRFPID-227755
CVRFPID-227918
CVRFPID-227920
CVRFPID-228689
CVRFPID-228690
CVRFPID-228706
CVRFPID-229124
CVRFPID-229136
CVRFPID-229187
CVRFPID-230240
CVRFPID-230303
CVRFPID-230998
CVRFPID-231004
CVRFPID-231187
CVRFPID-231246
CVRFPID-231389
CVRFPID-231390
CVRFPID-231472
CVRFPID-231667
CVRFPID-231682
CVRFPID-232008
CVRFPID-232009
CVRFPID-232461
CVRFPID-232766
CVRFPID-232767
CVRFPID-233141
CVRFPID-233155
CVRFPID-233447
CVRFPID-235307
CVRFPID-235858
CVRFPID-236834
CVRFPID-236837
CVRFPID-237460
CVRFPID-238937
CVRFPID-239000
CVRFPID-239007
CVRFPID-239264
CVRFPID-240187
CVRFPID-241736
CVRFPID-242308
CVRFPID-242315
CVRFPID-242834
CVRFPID-243362
CVRFPID-244070
CVRFPID-244071
CVRFPID-244530
CVRFPID-244686
CVRFPID-244900
CVRFPID-244912
CVRFPID-245375
CVRFPID-245377
CVRFPID-246387
CVRFPID-247573
CVRFPID-247629
CVRFPID-248242
CVRFPID-249171
CVRFPID-250629
CVRFPID-251075
CVRFPID-251165
CVRFPID-251166
CVRFPID-251225
CVRFPID-252045
CVRFPID-252235
CVRFPID-252271
CVRFPID-252272
CVRFPID-252913
CVRFPID-252914
CVRFPID-254688
CVRFPID-254712
CVRFPID-257955
CVRFPID-257984
CVRFPID-258170
CVRFPID-258229
CVRFPID-258388
CVRFPID-258406
CVRFPID-258900
CVRFPID-260741
CVRFPID-260917
CVRFPID-261240
CVRFPID-261241
CVRFPID-261465
CVRFPID-262389
CVRFPID-262390
CVRFPID-262549
CVRFPID-262595
CVRFPID-262994
CVRFPID-263804
CVRFPID-264096
CVRFPID-264514
CVRFPID-265450
CVRFPID-265735
CVRFPID-265841
CVRFPID-266259
CVRFPID-267110
CVRFPID-267240
CVRFPID-267605
CVRFPID-268921
CVRFPID-270097
CVRFPID-270098
CVRFPID-271632
CVRFPID-271633
CVRFPID-271798
CVRFPID-271938
CVRFPID-272047
CVRFPID-272932
CVRFPID-273112
CVRFPID-273445
CVRFPID-273509
CVRFPID-273563
CVRFPID-273649
CVRFPID-273857
CVRFPID-274818
CVRFPID-274832
CVRFPID-275538
CVRFPID-276837
CVRFPID-277099
CVRFPID-277147
CVRFPID-277148
CVRFPID-277194
CVRFPID-277255
CVRFPID-277256
CVRFPID-277321
CVRFPID-277338
CVRFPID-277343
CVRFPID-277348
CVRFPID-277358
CVRFPID-277945
CVRFPID-278002
CVRFPID-278032
CVRFPID-278402
CVRFPID-278504
CVRFPID-278881
CVRFPID-279338
CVRFPID-279339
CVRFPID-280217
CVRFPID-280555
CVRFPID-93036
5.8
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:L
There are no workarounds that address this vulnerability.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-arp-mtfhBfjE
Cisco IOS and IOS XE Software ARP Resource Management Exhaustion Denial of Service Vulnerability