A vulnerability in the Broadband Network Gateway PPP over Ethernet (PPPoE) feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the PPPoE process to continually crash. This vulnerability exists because the PPPoE feature does not properly handle an error condition within a specific crafted packet sequence. An attacker could exploit this vulnerability by sending a sequence of specific PPPoE packets from controlled customer premises equipment (CPE). A successful exploit could allow the attacker to cause the PPPoE process to continually restart, resulting in a denial of service condition (DoS).Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
History

Fri, 01 Aug 2025 18:30:00 +0000

Type Values Removed Values Added
First Time appeared Cisco asr 9006
Cisco asr 9010
Cisco asr 9901
Cisco asr 9902
Cisco asr 9903
Cisco asr 9904
Cisco asr 9906
Cisco asr 9910
Cisco asr 9912
Cisco asr 9922
Cisco ios Xr
Cisco ios Xrv 9000
CPEs cpe:2.3:h:cisco:asr_9006:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_9010:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_9901:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_9902:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_9903:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_9904:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_9906:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_9910:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_9912:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_9922:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ios_xrv_9000:-:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.5.15:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.5.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.5.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.5.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.25:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.6.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.7.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.7.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.7.35:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.7.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.8.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.8.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:6.9.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.0.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.0.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.0.90:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.1.15:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.1.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.1.25:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.1.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.1.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.2.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.2.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.3.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.3.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.3.3:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.3.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.4.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.4.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xr:7.5.1:*:*:*:*:*:*:*
Vendors & Products Cisco asr 9006
Cisco asr 9010
Cisco asr 9901
Cisco asr 9902
Cisco asr 9903
Cisco asr 9904
Cisco asr 9906
Cisco asr 9910
Cisco asr 9912
Cisco asr 9922
Cisco ios Xr
Cisco ios Xrv 9000

Fri, 15 Nov 2024 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 15 Nov 2024 15:45:00 +0000

Type Values Removed Values Added
Description A vulnerability in the Broadband Network Gateway PPP over Ethernet (PPPoE) feature of Cisco IOS XR Software could allow an unauthenticated, adjacent attacker to cause the PPPoE process to continually crash. This vulnerability exists because the PPPoE feature does not properly handle an error condition within a specific crafted packet sequence. An attacker could exploit this vulnerability by sending a sequence of specific PPPoE packets from controlled customer premises equipment (CPE). A successful exploit could allow the attacker to cause the PPPoE process to continually restart, resulting in a denial of service condition (DoS).Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.This advisory is part of the September 2022 release of the Cisco IOS XR Software Security Advisory Bundled Publication. For a complete list of the advisories and links to them, see .
Title Cisco IOS XR Software Broadband Network Gateway PPPoE Denial of Service Vulnerability
Weaknesses CWE-391
References
Metrics cvssV3_1

{'score': 6.1, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published: 2024-11-15T15:31:20.913Z

Updated: 2024-11-15T15:46:25.684Z

Reserved: 2021-11-02T13:28:29.180Z

Link: CVE-2022-20849

cve-icon Vulnrichment

Updated: 2024-11-15T15:46:09.223Z

cve-icon NVD

Status : Analyzed

Published: 2024-11-15T16:15:23.327

Modified: 2025-08-01T18:27:12.177

Link: CVE-2022-20849

cve-icon Redhat

No data.