Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability
Cisco Security Advisory
Emergency Support:
+1 877 228 7302 (toll-free within North America)
+1 408 525 6532 (International direct-dial)
Non-emergency Support:
Email: psirt@cisco.com
Support requests that are received via e-mail are typically acknowledged within 48 hours.
Cisco product security incident response is the responsibility of the Cisco Product Security Incident Response Team (PSIRT). The Cisco PSIRT is a dedicated, global team that manages the receipt, investigation, and public reporting of security vulnerability information that is related to Cisco products and networks. The on-call Cisco PSIRT works 24x7 with Cisco customers, independent security researchers, consultants, industry organizations, and other vendors to identify possible security issues with Cisco products and networks.
More information can be found in Cisco Security Vulnerability Policy available at https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html
cisco-sa-profinet-J9QMCHPB
Final
1.2
1.0
2020-09-23T21:56:26
Initial public release.
1.1
2020-11-12T21:14:31
Removed 2520 Connected Grid Switches and Industrial Ethernet 3010 Series Switches from affected products list as they don't support PROFINET.
1.2
2020-12-09T15:09:18
Removed Industrial Ethernet 1000 Series Switches from Vulnerable Products.
2020-09-24T16:00:00
2020-12-09T15:09:18
TVCE
A vulnerability in the PROFINET feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause an affected device to crash and reload, resulting in a denial of service (DoS) condition on the device.
The vulnerability is due to insufficient processing logic for crafted PROFINET packets that are sent to an affected device. An attacker could exploit this vulnerability by sending crafted PROFINET packets to an affected device for processing. A successful exploit could allow the attacker to cause the device to crash and reload, resulting in a DoS condition on the device.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB"]
A companion advisory for affected devices that support PROFINET is available at the following link: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5 ["https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-ios-profinet-dos-65qYG3W5"].
This advisory is part of the September 24, 2020, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 25 Cisco Security Advisories that describe 34 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74268"].
This vulnerability affects Cisco Industrial Ethernet devices if they are running a vulnerable release of Cisco IOS or IOS XE Software and if they have the PROFINET feature enabled. The PROFINET feature is enabled by default on platforms that support it.
The following Cisco products support PROFINET:
Catalyst IE3200 Rugged Series Switches
Catalyst IE3300 Rugged Series Switches
Catalyst IE3400 Rugged Series Switches
Catalyst IE3400 Heavy Duty Series Switches
Embedded Services 2020 Series Switches
Embedded Services 3300 Series Switches
Industrial Ethernet 2000 Series Switches
Industrial Ethernet 2000U Series Switches
Industrial Ethernet 3000 Series Switches
Industrial Ethernet 4000 Series Switches
Industrial Ethernet 4010 Series Switches
Industrial Ethernet 5000 Series Switches
For information about which Cisco software releases are vulnerable, see the Fixed Software ["#fs"] section of this advisory.
Determine the Device Configuration Option 1: show profinet status
To determine whether PROFINET is enabled on a device, use the show profinet status command and check the State reported in the output. If the command returns a state of Enabled, the PROFINET feature is enabled and the device is vulnerable. If the command returns a state of Disabled or if the command does not exist, the PROFINET feature is not enabled and the device is not affected by this vulnerability.
The following example shows the output of the show profinet status command on a device that has the PROFINET feature enabled:
Switch# show profinet status
Profinet : Enabled
.
.
.
Option 2: show running-config all
Alternatively, use the show running-config all | include profinet command and look for an output line that contains only the word profinet. If the line is present, the PROFINET feature is enabled and the device is vulnerable. If profinet is not present alone on an output line, the PROFINET feature is not enabled and the device is not affected by this vulnerability.
The following example shows the output of the show running-config all | include profinet command on a device that has the PROFINET feature enabled:
Switch# show running-config all | include profinet
profinet
profinet mrp
profinet vlan 1
no profinet id
Only products listed in the Vulnerable Products ["#vp"] section of this advisory are known to be affected by this vulnerability.
Cisco has confirmed that this vulnerability does not affect Cisco IOS XR Software or Cisco NX-OS Software.
The two Cisco bug IDs associated with this advisory address the same vulnerability. Cisco bug ID CSCvr83393 is for Cisco IOS Software platforms, and CSCvs48147 is for Cisco IOS XE Software platforms.
This vulnerability is due to a crafted PROFINET packet. The Cisco implementation of PROFINET includes the unauthenticated Real-Time Communication (RTC) profile. This profile allows an unauthenticated user to reset the device based on the PROFINET protocol standards.
There are no workarounds that address this vulnerability. However, customers who do not use the PROFINET protocol can disable it by using the no profinet configuration command as shown in the following example:
Switch#config term
Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#no profinet Switch(config)#^Z Switch#show profinet status Profinet : Disabled Connection Status : Disconnected Vlan : 1 Profinet ID : GSD version : Unknown Reduct Ratio : 128 MRP : Enabled MRP License Status : Inactive MRP Max Rings Allowed : 0 Switch#
Cisco has released free software updates that address the vulnerability described in this advisory. Customers may only install and expect support for software versions and feature sets for which they have purchased a license. By installing, downloading, accessing, or otherwise using such software upgrades, customers agree to follow the terms of the Cisco software license: https://www.cisco.com/c/en/us/products/end-user-license-agreement.html ["https://www.cisco.com/c/en/us/products/end-user-license-agreement.html"]
Additionally, customers may only download software for which they have a valid license, procured from Cisco directly, or through a Cisco authorized reseller or partner. In most cases this will be a maintenance upgrade to software that was previously purchased. Free security software updates do not entitle customers to a new software license, additional software feature sets, or major revision upgrades.
When considering software upgrades ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html#fixes"], customers are advised to regularly consult the advisories for Cisco products, which are available from the Cisco Security Advisories page ["https://www.cisco.com/go/psirt"], to determine exposure and a complete upgrade solution.
In all cases, customers should ensure that the devices to be upgraded contain sufficient memory and confirm that current hardware and software configurations will continue to be supported properly by the new release. If the information is not clear, customers are advised to contact the Cisco Technical Assistance Center (TAC) or their contracted maintenance providers.
Customers Without Service Contracts
Customers who purchase directly from Cisco but do not hold a Cisco service contract and customers who make purchases through third-party vendors but are unsuccessful in obtaining fixed software through their point of sale should obtain upgrades by contacting the Cisco TAC: https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html ["https://www.cisco.com/c/en/us/support/web/tsd-cisco-worldwide-contacts.html"]
Customers should have the product serial number available and be prepared to provide the URL of this advisory as evidence of entitlement to a free upgrade.
Cisco IOS and IOS XE Software
To help customers determine their exposure to vulnerabilities in Cisco IOS and IOS XE Software, Cisco provides the Cisco Software Checker ["https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"] to identify any Cisco Security Advisories that impact a specific software release and the earliest release that fixes the vulnerabilities described in each advisory (“First Fixed”). If applicable, the tool also returns the earliest release that fixes all the vulnerabilities described in all the advisories identified (“Combined First Fixed”).
Customers can use the Cisco Software Checker ["https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"] to search advisories in the following ways:
Choose the software and one or more releases
Upload a .txt file that includes a list of specific releases
Enter the output of the show version command
After initiating a search, customers can customize the search to include all Cisco Security Advisories, a specific advisory, or all advisories in the most recent bundled publication.
Customers can also use the following form to determine whether a release is affected by any Cisco Security Advisory by entering a Cisco IOS or IOS XE Software release—for example, 15.1(4)M2 or 3.13.8S:
By default, the Cisco Software Checker ["https://sec.cloudapps.cisco.com/security/center/softwarechecker.x"] includes results only for vulnerabilities that have a Critical or High Security Impact Rating (SIR). To include results for Medium SIR vulnerabilities, customers can use the Cisco Software Checker on Cisco.com and check the Medium check box in the drop-down list under Impact Rating when customizing a search.
For a mapping of Cisco IOS XE Software releases to Cisco IOS Software releases, refer to the Cisco IOS XE 2 Release Notes ["https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/2/release/notes/rnasr21/rnasr21_gen.html#wp3000032"], Cisco IOS XE 3S Release Notes ["https://www.cisco.com/c/en/us/td/docs/ios/ios_xe/3/release/notes/asr1k_rn_3s_rel_notes/asr1k_rn_3s_sys_req.html#wp3069754"], or Cisco IOS XE 3SG Release Notes ["https://www.cisco.com/c/en/us/td/docs/switches/lan/catalyst4500/release/note/OL_24726.html#pgfId-2570252"], depending on the Cisco IOS XE Software release.
To learn about Cisco security vulnerability disclosure policies and publications, see the Security Vulnerability Policy ["https://sec.cloudapps.cisco.com/security/center/resources/security_vulnerability_policy.html"]. This document also contains instructions for obtaining fixed software and receiving security vulnerability information from Cisco.
The Cisco Product Security Incident Response Team (PSIRT) is not aware of any public announcements or malicious use of the vulnerability that is described in this advisory.
This vulnerability was found by Burt Welsh of Cisco during internal security testing.
THIS DOCUMENT IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. CISCO RESERVES THE RIGHT TO CHANGE OR UPDATE THIS DOCUMENT AT ANY TIME.
A standalone copy or paraphrase of the text of this document that omits the distribution URL is an uncontrolled copy and may lack important information or contain factual errors. The information in this document is intended for end users of Cisco products.
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB
Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability
https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-74268
Cisco Event Response: September 2020 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication
Cisco IOS 12.2(55)SE
Cisco IOS 12.2(55)SE3
Cisco IOS 12.2(52)SE
Cisco IOS 12.2(58)SE
Cisco IOS 12.2(52)SE1
Cisco IOS 12.2(58)SE1
Cisco IOS 12.2(55)SE4
Cisco IOS 12.2(58)SE2
Cisco IOS 12.2(55)SE5
Cisco IOS 12.2(55)SE6
Cisco IOS 12.2(55)SE7
Cisco IOS 12.2(55)SE9
Cisco IOS 12.2(55)SE10
Cisco IOS 12.2(55)SE11
Cisco IOS 12.2(55)SE12
Cisco IOS 12.2(55)SE13
Cisco IOS 12.2(60)EZ16
Cisco IOS 15.0(1)EY
Cisco IOS 15.0(1)EY2
Cisco IOS 15.0(2)EY
Cisco IOS 15.0(2)EY1
Cisco IOS 15.0(2)EY2
Cisco IOS 15.0(2)EY3
Cisco IOS 15.0(2)SE
Cisco IOS 15.0(2)SE1
Cisco IOS 15.0(2)SE2
Cisco IOS 15.0(2)SE3
Cisco IOS 15.0(2)SE4
Cisco IOS 15.0(2)SE5
Cisco IOS 15.0(2)SE6
Cisco IOS 15.0(2)SE7
Cisco IOS 15.0(2)SE8
Cisco IOS 15.0(2)SE9
Cisco IOS 15.0(2)SE10
Cisco IOS 15.0(2)SE11
Cisco IOS 15.0(2)SE10a
Cisco IOS 15.0(2)SE12
Cisco IOS 15.0(2)SG11a
Cisco IOS 15.0(2)EX2
Cisco IOS 15.0(2)EX8
Cisco IOS 15.0(2)EA
Cisco IOS 15.0(2)EA1
Cisco IOS 15.2(2)E
Cisco IOS 15.2(2)E1
Cisco IOS 15.2(2b)E
Cisco IOS 15.2(3)E1
Cisco IOS 15.2(2)E2
Cisco IOS 15.2(2)E3
Cisco IOS 15.2(3)E2
Cisco IOS 15.2(3)E3
Cisco IOS 15.2(2)E4
Cisco IOS 15.2(2)E5
Cisco IOS 15.2(3)E4
Cisco IOS 15.2(5)E
Cisco IOS 15.2(2)E6
Cisco IOS 15.2(5)E1
Cisco IOS 15.2(2)E5a
Cisco IOS 15.2(3)E5
Cisco IOS 15.2(2)E5b
Cisco IOS 15.2(5a)E1
Cisco IOS 15.2(2)E7
Cisco IOS 15.2(5)E2
Cisco IOS 15.2(6)E
Cisco IOS 15.2(5)E2b
Cisco IOS 15.2(5)E2c
Cisco IOS 15.2(2)E8
Cisco IOS 15.2(6)E0a
Cisco IOS 15.2(6)E1
Cisco IOS 15.2(2)E7b
Cisco IOS 15.2(6)E0c
Cisco IOS 15.2(2)E9
Cisco IOS 15.2(6)E1a
Cisco IOS 15.2(6)E1s
Cisco IOS 15.2(7)E
Cisco IOS 15.2(2)E10
Cisco IOS 15.2(6)E2a
Cisco IOS 15.2(7)E0b
Cisco IOS 15.2(7)E0s
Cisco IOS 15.2(6)E3
Cisco IOS 15.2(7a)E0b
Cisco IOS 15.2(4)E10e
Cisco IOS 15.2(1)EY
Cisco IOS 15.2(2)EB
Cisco IOS 15.2(2)EB1
Cisco IOS 15.2(2)EB2
Cisco IOS 15.2(6)EB
Cisco IOS 15.2(2)EA
Cisco IOS 15.2(2)EA2
Cisco IOS 15.2(3)EA
Cisco IOS 15.2(4)EA
Cisco IOS 15.2(4)EA1
Cisco IOS 15.2(2)EA3
Cisco IOS 15.2(4)EA3
Cisco IOS 15.2(5)EA
Cisco IOS 15.2(4)EA4
Cisco IOS 15.2(4)EA2
Cisco IOS 15.2(4)EA5
Cisco IOS 15.2(4)EA6
Cisco IOS 15.2(4)EA7
Cisco IOS 15.2(4)EA8
Cisco IOS 15.2(4)EA9
Cisco IOS 15.3(3)JAA1
Cisco IOS 15.2(4)EC1
Cisco IOS 15.2(4)EC2
Cisco IOS
Cisco IOS XE Software 16.9.1
Cisco IOS XE Software 16.9.1d
Cisco IOS XE Software 16.10.1
Cisco IOS XE Software 16.10.1e
Cisco IOS XE Software 16.11.1
Cisco IOS XE Software 16.11.1a
Cisco IOS XE Software 16.11.1b
Cisco IOS XE Software 16.11.1s
Cisco IOS XE Software 16.11.1c
Cisco IOS XE Software 16.12.1s
Cisco IOS XE Software 16.12.1c
Cisco IOS XE Software 16.12.2
Cisco IOS XE Software 16.12.2s
Cisco IOS XE Software 16.12.2t
Cisco IOS XE Software 17.1.1
Cisco IOS XE Software 17.1.1s
Cisco IOS XE Software 17.1.1t
Cisco IOS XE Software
Cisco IOS and Cisco IOS XE Software Profinet Denial of Service Vulnerability
CSCvs48147
CSCvs48147,CSCvr83393
Complete.
CVE-2020-3409
CVRFPID-225856
CVRFPID-225858
CVRFPID-227918
CVRFPID-245377
CVRFPID-248242
CVRFPID-252271
CVRFPID-257955
CVRFPID-260741
CVRFPID-261465
CVRFPID-264096
CVRFPID-265735
CVRFPID-267110
CVRFPID-267605
CVRFPID-273509
CVRFPID-274818
CVRFPID-275538
CVRFPID-277348
CVRFPID-93036
CVRFPID-103763
CVRFPID-104376
CVRFPID-105394
CVRFPID-105973
CVRFPID-105987
CVRFPID-106684
CVRFPID-107852
CVRFPID-109098
CVRFPID-109439
CVRFPID-109808
CVRFPID-111674
CVRFPID-114665
CVRFPID-115939
CVRFPID-116083
CVRFPID-117282
CVRFPID-184125
CVRFPID-187057
CVRFPID-187269
CVRFPID-187932
CVRFPID-189455
CVRFPID-190250
CVRFPID-190635
CVRFPID-191928
CVRFPID-192706
CVRFPID-192831
CVRFPID-192910
CVRFPID-192911
CVRFPID-193033
CVRFPID-195481
CVRFPID-195770
CVRFPID-197462
CVRFPID-198063
CVRFPID-198542
CVRFPID-201074
CVRFPID-204097
CVRFPID-204102
CVRFPID-204186
CVRFPID-204228
CVRFPID-204831
CVRFPID-205672
CVRFPID-209028
CVRFPID-209029
CVRFPID-209046
CVRFPID-209050
CVRFPID-209051
CVRFPID-209358
CVRFPID-2097
CVRFPID-209839
CVRFPID-210203
CVRFPID-210732
CVRFPID-210766
CVRFPID-210958
CVRFPID-211296
CVRFPID-213788
CVRFPID-214078
CVRFPID-214217
CVRFPID-214218
CVRFPID-214556
CVRFPID-214965
CVRFPID-218891
CVRFPID-220038
CVRFPID-220441
CVRFPID-220460
CVRFPID-220461
CVRFPID-220466
CVRFPID-220507
CVRFPID-221033
CVRFPID-222275
CVRFPID-222342
CVRFPID-222419
CVRFPID-222436
CVRFPID-223086
CVRFPID-223143
CVRFPID-224868
CVRFPID-225740
CVRFPID-227598
CVRFPID-227754
CVRFPID-228057
CVRFPID-228075
CVRFPID-228151
CVRFPID-230587
CVRFPID-230591
CVRFPID-230592
CVRFPID-230594
CVRFPID-230962
CVRFPID-230990
CVRFPID-230992
CVRFPID-231245
CVRFPID-232765
CVRFPID-234926
CVRFPID-238999
CVRFPID-240186
CVRFPID-241614
CVRFPID-242313
CVRFPID-244911
CVRFPID-247630
CVRFPID-251487
CVRFPID-257830
CVRFPID-260993
CVRFPID-262300
CVRFPID-262335
CVRFPID-262536
CVRFPID-262684
CVRFPID-271140
CVRFPID-290630
7.4
CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
There are no workarounds that address this vulnerability. However, customers who do not use the PROFINET protocol can disable it by using the no profinet configuration command as shown in the following example:
Switch#config term
Enter configuration commands, one per line. End with CNTL/Z. Switch(config)#no profinet Switch(config)#^Z Switch#show profinet status Profinet : Disabled Connection Status : Disconnected Vlan : 1 Profinet ID : GSD version : Unknown Reduct Ratio : 128 MRP : Enabled MRP License Status : Inactive MRP Max Rings Allowed : 0 Switch#
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-profinet-J9QMCHPB
Cisco IOS and IOS XE Software PROFINET Denial of Service Vulnerability