Cisco IOS XE Software TLS Memory Exhaustion Denial of Service Vulnerability
A vulnerability in the TLS library of Cisco IOS XE Software (versions 16.10.1 through 17.9.6b) allows an unauthenticated attacker on the same network segment to exhaust device memory by repeatedly initiating TLS connection attempts or EAP authentication requests, or by performing machine-in-the-middle attacks that reset TLS connections. The device improperly manages memory during TLS setup, failing to release memory when connections fail. Successful exploitation causes the affected device to run out of memory, triggering an unexpected reload and denial of service. Cisco has released software updates to address this issue. No workarounds are available.
- Adjacent network access (same broadcast domain or directly connected network segment)
- Device must have EAP authentication enabled (if using EAP attack path) or be a target of TLS connection reset attacks
- No authentication credentials required
Patching may require device reboot — plan for process interruption
/api/v1/advisories/1364c99e-72df-4672-a6f1-3791cd6225fdGet OT security insights every Tuesday
Advisory breakdowns, a weekly summary, and incident analyses for the people actually defending OT environments. Free, no account required.