Vulnerabilites related to cisco - 829_integrated_services_router
Vulnerability from fkie_nvd
Published
2016-06-23 00:59
Modified
2024-11-21 02:34
Severity ?
Summary
Cisco IOS 15.5(3)M on Integrated Services Router (ISR) 800, 819, and 829 devices allows remote attackers to cause a denial of service (memory consumption) via crafted TCP packets on the SSH port, aka Bug ID CSCuu13476.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr | Vendor Advisory | |
psirt@cisco.com | http://www.securityfocus.com/bid/91322 | Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1036141 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/91322 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1036141 | Third Party Advisory, VDB Entry |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
cisco | ios | 15.5\(3\)m | |
cisco | 800_integrated_services_router | * | |
cisco | 819_integrated_services_router | * | |
cisco | 829_integrated_services_router | * |
{ configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:15.5\\(3\\)m:*:*:*:*:*:*:*", matchCriteriaId: "716EC9AA-0569-4FA7-A244-1A14FA15C5AD", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:800_integrated_services_router:*:*:*:*:*:*:*:*", matchCriteriaId: "848C62DF-E3D6-4A32-A149-1A0155416EFE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:819_integrated_services_router:*:*:*:*:*:*:*:*", matchCriteriaId: "257E6F03-DB00-4C61-A965-50E85C9CE17F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_integrated_services_router:*:*:*:*:*:*:*:*", matchCriteriaId: "676A743C-0517-400A-90D8-B55BD32AF927", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "Cisco IOS 15.5(3)M on Integrated Services Router (ISR) 800, 819, and 829 devices allows remote attackers to cause a denial of service (memory consumption) via crafted TCP packets on the SSH port, aka Bug ID CSCuu13476.", }, { lang: "es", value: "Cisco IOS 15.5(3)M en dispositivos Integrated Services Router (ISR) 800, 819 y 829 permite a atacantes remotos causar una denegación de servicio (consumo de memoria) a través de un paquete TCP manipulado en el puerto SSH, también conocido como Bug ID CSCuu13476.", }, ], id: "CVE-2015-6289", lastModified: "2024-11-21T02:34:42.600", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "NETWORK", authentication: "NONE", availabilityImpact: "PARTIAL", baseScore: 5, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P", version: "2.0", }, exploitabilityScore: 10, impactScore: 2.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV30: [ { cvssData: { attackComplexity: "LOW", attackVector: "NETWORK", availabilityImpact: "HIGH", baseScore: 7.5, baseSeverity: "HIGH", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.0", }, exploitabilityScore: 3.9, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2016-06-23T00:59:00.127", references: [ { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91322", }, { source: "psirt@cisco.com", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1036141", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/91322", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1036141", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Modified", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
Vulnerability from fkie_nvd
Published
2017-09-29 01:34
Modified
2025-01-27 19:23
Severity ?
Summary
A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@cisco.com | http://www.securityfocus.com/bid/101044 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | http://www.securitytracker.com/id/1039452 | Broken Link, Third Party Advisory, VDB Entry | |
psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101044 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039452 | Broken Link, Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos | Vendor Advisory |
Impacted products
{ cisaActionDue: "2022-03-24", cisaExploitAdd: "2022-03-03", cisaRequiredAction: "Apply updates per vendor instructions.", cisaVulnerabilityName: "Cisco IOS Software for Cisco Integrated Services Routers Denial-of-Service Vulnerability", configurations: [ { nodes: [ { cpeMatch: [ { criteria: "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", matchCriteriaId: "650EB42C-D85F-482B-972D-7DCAC210DC48", versionEndIncluding: "15.6", versionStartIncluding: "15.0", vulnerable: true, }, ], negate: false, operator: "OR", }, { cpeMatch: [ { criteria: "cpe:2.3:h:cisco:1000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F4856E07-B3C2-4674-9584-866F6AF643B2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g\\/6g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6F668B9-2C1D-4306-8286-35E67D0F67C7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0F77CD6A-83DA-4F31-A128-AD6DAECD623B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltegb_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "62564BB8-1282-4597-A645-056298BE7CCB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-4gltena_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "80E9CC47-3D7C-437A-85BE-4BB94C8AF1B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "26DD41B3-1D1D-44D3-BA8E-5A66AFEE77E6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100-lte_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EBE4E146-1D77-4F15-AE58-3C1CE5DB62C5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1100_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1952B64C-4AE0-4CCB-86C5-8D1FF6A12822", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5AAD4397-6DCF-493A-BD61-3A890F6F3AB2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1101_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5EB8A757-7888-4AC2-BE44-B89DB83C6C77", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-2p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3F2F0A8E-97F6-41AC-BE67-4B2D60F9D36B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109-4p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BB9229F3-7BCE-46C4-9879-D57B5BAAE44E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1109_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B80890A8-E3D3-462C-B125-9E9BC6525B02", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x-8p_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A5A606FE-E6F1-43F9-B1CD-D9DF35FC3573", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "0547E196-5991-4C33-823A-342542E9DFD3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:111x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "802CBFC1-8A2F-4BF7-A1D3-00622C33BE16", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1120_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7AFE0FC1-EEBC-42F0-88B0-4AF5B76DDD97", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1131_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F3F374DC-B9F7-4515-A064-01BB436CA984", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1160_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D916389F-54DB-44CB-91DD-7CE3C7059350", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1801_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6D5E48D7-2266-4649-90A9-62C476AFE6DE", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1802_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "99581637-E184-4A02-8313-57C7C31E5479", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1803_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9C6D4A90-31B9-4B6C-ADAC-44C49DB44115", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1811_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3AF3F75-0BD8-4AA6-B696-3624BEE86681", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1812_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C58CEA6-69F8-4021-98C9-4676C70AB167", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1841_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DF156D97-7C39-49CF-9938-D9681066FF05", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1861_integrated_service_router:-:*:*:*:*:*:*:*", matchCriteriaId: "459FEB4E-54E3-4FE5-82A5-6E4ECE855DD6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1905_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "871AC0F6-5C01-43A1-8436-7885439BD81F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1906c_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B1DEFFA8-11A6-43CC-A886-DD38EFF22ACB", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1921_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "2147DBF8-B733-4F76-90C5-9D94F1E93625", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6F42D5B4-BB07-4C9C-852F-0D839E9F2AA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:1941w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9222CA59-F4FD-478D-83C9-566B389140B8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4000_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CE82335E-ECEC-47BD-BC4A-5FDEA08D1A18", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:422_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "03A273EE-41C1-41E9-9002-46F83FC6533F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4221_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6C8AED7C-DDA3-4C29-BB95-6518C02C551A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "05C90C43-2D7D-43F8-AD7F-421878909AE2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "445597DA-7EEC-470D-9A71-BC43A9F7DE5E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "86049773-C88D-4A26-A0D3-D40F3C312AEC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9421DBEF-AE42-4234-B49F-FCC34B804D7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "6AB4B7C2-4D45-4267-BCBB-57D36C6104A3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "3B8A4630-8B21-4994-8EF5-E105593A64E5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F799DC02-EB06-458C-8545-A174475FE7A2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5419CB9F-241F-4431-914F-2659BE27BEA5", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-rf_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B89FBA68-A8ED-4C5A-916E-A68468F59730", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9-ws_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CD272E6E-2ED1-4408-8FF7-0B82F9DCBEF8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351\\/k9_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DC278B77-AD63-42AD-B9E8-EE4DE97E27E9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5720462A-BE6B-4E84-A1A1-01E80BBA86AD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:44461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "697BEF89-6D9B-4870-BE85-9090152F3E6E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "818CEFA6-208C-43C3-8E43-474A93ADCF21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4451_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "82225D40-537F-41D2-B1C4-1B7D06466B06", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:4461_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E8B60888-6E2B-494E-AC65-83337661EE7D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_industrial_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "398D63B0-F15B-409B-AFBC-DE6C94FAF815", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_industrial_integrated_services_routers:-:*:*:*:*:*:*:*", matchCriteriaId: "F0D05CC9-8D04-4DE0-A854-375192B4D46C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:829_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "9030977A-7753-4ED5-A082-4B2F5749D37D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:860vae-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "4C9C511D-7D5E-4758-A335-70019EBD9F8C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:861_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E109E908-78B9-44ED-8719-B057057C2185", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:861w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "31F8D515-3D54-459F-8CE7-FFA91439C0D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:866vae_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "510B60EF-AA4D-469F-8EEF-133F354DDF55", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:867_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EF7E6C9E-326B-42EF-86D4-4FB2C13E2BA4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:867vae_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "8D562373-BD3F-4690-928F-9FE0325A3379", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:871_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "F1A300FE-D6D3-41AC-9792-4D0E28621F72", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:880-voice_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "EB62165B-6CA9-4DD8-8A36-B658F61FF9EF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:880_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "8A2F1852-8ADC-42E0-8D05-961A733523D1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "DA5ACE25-8C18-49B0-AFFC-17CB30F61930", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "AB6E4CF5-D944-4281-94E5-72BC5437BC62", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "CFB6E8CC-89B8-490A-BFCF-FA9D55543B21", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:881w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "480629DC-DA23-4A9E-B90F-E8AB894C9353", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BCEBDDE6-0EA0-4C2B-9A04-87236312A269", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886va-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "4D3EA60A-1BA9-43E8-AF81-914846C26CC1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886va-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "FA7C5306-B810-4036-A241-7178F48ABE8E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886va_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5413C7E7-F55C-4158-ABDF-2D8844B96680", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:886vag_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A6745ADF-DCE3-42C3-A548-F9E44AEE88CC", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "FEFD38B2-348F-4EF2-A9B7-40A9AA5FF511", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887v_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "A4F9EA2E-9EE7-4F68-9765-C78F85624F2D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887va-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "1563AC8D-4E4D-4126-8C5D-84B449AAEF57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887va-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B3945CCD-E6F5-412D-9935-160BCD664B10", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887va_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B0C23393-F7BB-4BA9-81A5-C298D84EBF0B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887vag_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "61B623C2-D81B-430B-9FD2-E2764EE94809", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887vam-w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "828E07F6-1E92-4990-AEBC-DBFE4B5B2DE4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:887vamg_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "08B77C60-06E0-47FF-8CD4-35FE5C60FF95", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7E97DA13-D485-42BE-A0E9-F40A0C823735", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "E984A1EA-728A-4663-8494-1787AB5D93C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888e-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "35D9B6C7-A707-41CD-953F-5773FB3F7685", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888e_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "716E154A-5586-4F58-8203-EC8256E00BAD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888eg_3g_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "7CC0F79A-52CA-46A6-9C6A-0596718053E7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:888w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "8054E665-E4DA-4453-A34B-830B69D273A7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:891-24x_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "BEA480B3-25E2-4B05-9F46-417B696789B4", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:891_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "526558F9-C72D-4DDA-B0DF-CAF7B97E30C1", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:891w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "B4B9D069-85C0-4299-BCAF-441A2D6227BF", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:892_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "53AFBDFF-3D83-4685-82EE-A9EA4DC09241", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:892f-cube_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "AB4AF464-B247-40CF-A2B5-1B278303418B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:892w_integrated_services_router:-:*:*:*:*:*:*:*", matchCriteriaId: "D674C533-304A-42A4-97EE-1CA39908E888", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000:-:*:*:*:*:*:*:*", matchCriteriaId: "91209C16-A620-44A0-9134-8AA456343F29", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100:-:*:*:*:*:*:*:*", matchCriteriaId: "3C5C1005-0C12-4EDA-BC4A-B52201C4F516", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp100-x:-:*:*:*:*:*:*:*", matchCriteriaId: "917B52DF-4210-4DD6-97EF-8A033497A954", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-esp200-x:-:*:*:*:*:*:*:*", matchCriteriaId: "D7F413FB-D4F9-4113-9D67-2956BF1DC30D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000-x:-:*:*:*:*:*:*:*", matchCriteriaId: "FE2182E7-C813-4966-A36C-E648A9344299", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1000_:-:*:*:*:*:*:*:*", matchCriteriaId: "0ABA6B44-E3FB-4B9C-8148-D9F10E617DB8", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001:-:*:*:*:*:*:*:*", matchCriteriaId: "ED7C321E-F083-4AB6-96A0-D6358980441E", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "7594E307-AC80-41EC-AE94-07E664A7D701", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "33208B25-0CBB-4E31-A892-60B7B5625155", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*", matchCriteriaId: "09C913FF-63D5-43FB-8B39-598EF436BA5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1001-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "241EEBD9-76E4-4AE6-96B8-1C1ACD834F17", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002:-:*:*:*:*:*:*:*", matchCriteriaId: "E4376E56-A21C-4642-A85D-439C8E21CD7F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*", matchCriteriaId: "CD2794BD-C8CE-46EF-9857-1723FCF04E46", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-hx_r:-:*:*:*:*:*:*:*", matchCriteriaId: "CC03A84F-C8F2-4225-9A00-8FA35368CD57", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*", matchCriteriaId: "444F688F-79D0-4F22-B530-7BD520080B8F", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1002-x_r:-:*:*:*:*:*:*:*", matchCriteriaId: "51F2A755-556C-4C5E-8622-96D124319AF7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*", matchCriteriaId: "55DD2272-10C2-43B9-9F13-6DC41DBE179B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*", matchCriteriaId: "7428E0A8-1641-47FB-9CA9-34311DEF660D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*", matchCriteriaId: "DE7401B7-094C-46EB-9869-2F0372E8B26B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*", matchCriteriaId: "8D8A72FD-D8B0-45B5-8FAD-6D8395BB218A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*", matchCriteriaId: "854D9594-FE84-4E7B-BA21-A3287F2DC302", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:asr_1023:-:*:*:*:*:*:*:*", matchCriteriaId: "C81CC6E3-B989-4730-820E-46734E3E608D", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8200:-:*:*:*:*:*:*:*", matchCriteriaId: "EE9EABE0-5FB0-4277-A389-87732E750B7C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300:-:*:*:*:*:*:*:*", matchCriteriaId: "72BBF8E8-7AD9-46B8-8B02-F0DB1F95E1CD", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "5E7E8914-7B25-4097-8B22-6928C1F03D5A", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-1n1s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "B207857B-C483-47DF-9FC7-6A05B866BF60", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-4t2x:-:*:*:*:*:*:*:*", matchCriteriaId: "CD26746A-80D1-4C48-BF77-E9F7EEEF7EA7", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8300-2n2s-6t:-:*:*:*:*:*:*:*", matchCriteriaId: "BDB16CCE-1E89-4707-86C1-97F2FB5B62B9", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500:-:*:*:*:*:*:*:*", matchCriteriaId: "7A82CE19-C3C4-4FAD-A1B3-AB91EDB61591", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500-4qc:-:*:*:*:*:*:*:*", matchCriteriaId: "A1DBA393-232D-40E6-9CDB-DF82D2E7A5B6", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8500l:-:*:*:*:*:*:*:*", matchCriteriaId: "04AB61E9-0148-495E-BD21-64D52DE60A6C", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510csr:-:*:*:*:*:*:*:*", matchCriteriaId: "85D2C587-E95B-4E74-88CF-5930072258D3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8510msr:-:*:*:*:*:*:*:*", matchCriteriaId: "D3D1BB0B-0EFE-4C6D-A18E-3E48ABA01F00", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540csr:-:*:*:*:*:*:*:*", matchCriteriaId: "74270062-2030-45A0-9C93-C1F3B7C88E8B", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:catalyst_8540msr:-:*:*:*:*:*:*:*", matchCriteriaId: "0F403859-F034-4DD9-9CA5-708EADECB380", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*", matchCriteriaId: "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3", vulnerable: false, }, { criteria: "cpe:2.3:h:cisco:integrated_services_virtual_router:-:*:*:*:*:*:*:*", matchCriteriaId: "5361C70A-C036-4254-9698-BC58F48C465B", vulnerable: false, }, ], negate: false, operator: "OR", }, ], operator: "AND", }, ], cveTags: [], descriptions: [ { lang: "en", value: "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.", }, { lang: "es", value: "Una vulnerabilidad en la implementación de un protocolo en los routers Cisco Integrated Services Routers Generation 2 (ISR G2) que ejecuten Cisco IOS desde la versión 15.0 hasta la 15.6 podría permitir que un atacante adyacente sin autenticar haga que el dispositivo afectado se reinicie, provocando una denegación de servicio (DoS) en consecuencia. Esta vulnerabilidad se debe a una clasificación incorrecta de los frames Ethernet. Un atacante podría explotar esta vulnerabilidad enviando un frame Ethernet al dispositivo afectado. Si se explota con éxito, podría permitir que el atacante provoque que el dispositivo afectado se reinicie, provocando una denegación de servicio. Cisco Bug IDs: CSCvc03809.", }, ], id: "CVE-2017-12232", lastModified: "2025-01-27T19:23:29.077", metrics: { cvssMetricV2: [ { acInsufInfo: false, baseSeverity: "MEDIUM", cvssData: { accessComplexity: "LOW", accessVector: "ADJACENT_NETWORK", authentication: "NONE", availabilityImpact: "COMPLETE", baseScore: 6.1, confidentialityImpact: "NONE", integrityImpact: "NONE", vectorString: "AV:A/AC:L/Au:N/C:N/I:N/A:C", version: "2.0", }, exploitabilityScore: 6.5, impactScore: 6.9, obtainAllPrivilege: false, obtainOtherPrivilege: false, obtainUserPrivilege: false, source: "nvd@nist.gov", type: "Primary", userInteractionRequired: false, }, ], cvssMetricV31: [ { cvssData: { attackComplexity: "LOW", attackVector: "ADJACENT_NETWORK", availabilityImpact: "HIGH", baseScore: 6.5, baseSeverity: "MEDIUM", confidentialityImpact: "NONE", integrityImpact: "NONE", privilegesRequired: "NONE", scope: "UNCHANGED", userInteraction: "NONE", vectorString: "CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", version: "3.1", }, exploitabilityScore: 2.8, impactScore: 3.6, source: "nvd@nist.gov", type: "Primary", }, ], }, published: "2017-09-29T01:34:48.780", references: [ { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101044", }, { source: "psirt@cisco.com", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039452", }, { source: "psirt@cisco.com", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securityfocus.com/bid/101044", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Broken Link", "Third Party Advisory", "VDB Entry", ], url: "http://www.securitytracker.com/id/1039452", }, { source: "af854a3a-2127-422b-91ae-364da2661108", tags: [ "Vendor Advisory", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, ], sourceIdentifier: "psirt@cisco.com", vulnStatus: "Analyzed", weaknesses: [ { description: [ { lang: "en", value: "CWE-399", }, ], source: "psirt@cisco.com", type: "Secondary", }, { description: [ { lang: "en", value: "NVD-CWE-noinfo", }, ], source: "nvd@nist.gov", type: "Primary", }, ], }
cve-2015-6289
Vulnerability from cvelistv5
Published
2016-06-23 00:00
Modified
2024-08-06 07:15
Severity ?
EPSS score ?
Summary
Cisco IOS 15.5(3)M on Integrated Services Router (ISR) 800, 819, and 829 devices allows remote attackers to cause a denial of service (memory consumption) via crafted TCP packets on the SSH port, aka Bug ID CSCuu13476.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/91322 | vdb-entry, x_refsource_BID | |
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr | vendor-advisory, x_refsource_CISCO | |
http://www.securitytracker.com/id/1036141 | vdb-entry, x_refsource_SECTRACK |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-06T07:15:13.287Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { name: "91322", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/91322", }, { name: "20160620 Cisco Integrated Services Routers OpenSSH TCP Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", "x_transferred", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr", }, { name: "1036141", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1036141", }, ], title: "CVE Program Container", }, ], cna: { affected: [ { product: "n/a", vendor: "n/a", versions: [ { status: "affected", version: "n/a", }, ], }, ], datePublic: "2016-06-20T00:00:00", descriptions: [ { lang: "en", value: "Cisco IOS 15.5(3)M on Integrated Services Router (ISR) 800, 819, and 829 devices allows remote attackers to cause a denial of service (memory consumption) via crafted TCP packets on the SSH port, aka Bug ID CSCuu13476.", }, ], problemTypes: [ { descriptions: [ { description: "n/a", lang: "en", type: "text", }, ], }, ], providerMetadata: { dateUpdated: "2016-11-28T20:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { name: "91322", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/91322", }, { name: "20160620 Cisco Integrated Services Routers OpenSSH TCP Denial of Service Vulnerability", tags: [ "vendor-advisory", "x_refsource_CISCO", ], url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr", }, { name: "1036141", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1036141", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2015-6289", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "n/a", version: { version_data: [ { version_value: "n/a", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "Cisco IOS 15.5(3)M on Integrated Services Router (ISR) 800, 819, and 829 devices allows remote attackers to cause a denial of service (memory consumption) via crafted TCP packets on the SSH port, aka Bug ID CSCuu13476.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "n/a", }, ], }, ], }, references: { reference_data: [ { name: "91322", refsource: "BID", url: "http://www.securityfocus.com/bid/91322", }, { name: "20160620 Cisco Integrated Services Routers OpenSSH TCP Denial of Service Vulnerability", refsource: "CISCO", url: "http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20160620-isr", }, { name: "1036141", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1036141", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2015-6289", datePublished: "2016-06-23T00:00:00", dateReserved: "2015-08-17T00:00:00", dateUpdated: "2024-08-06T07:15:13.287Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }
cve-2017-12232
Vulnerability from cvelistv5
Published
2017-09-28 07:00
Modified
2024-11-15 17:58
Severity ?
EPSS score ?
Summary
A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.
References
▼ | URL | Tags |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos | x_refsource_CONFIRM | |
http://www.securitytracker.com/id/1039452 | vdb-entry, x_refsource_SECTRACK | |
http://www.securityfocus.com/bid/101044 | vdb-entry, x_refsource_BID |
{ containers: { adp: [ { providerMetadata: { dateUpdated: "2024-08-05T18:28:16.692Z", orgId: "af854a3a-2127-422b-91ae-364da2661108", shortName: "CVE", }, references: [ { tags: [ "x_refsource_CONFIRM", "x_transferred", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { name: "1039452", tags: [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred", ], url: "http://www.securitytracker.com/id/1039452", }, { name: "101044", tags: [ "vdb-entry", "x_refsource_BID", "x_transferred", ], url: "http://www.securityfocus.com/bid/101044", }, ], title: "CVE Program Container", }, { metrics: [ { other: { content: { id: "CVE-2017-12232", options: [ { Exploitation: "active", }, { Automatable: "no", }, { "Technical Impact": "partial", }, ], role: "CISA Coordinator", timestamp: "2024-11-08T17:34:20.447301Z", version: "2.0.3", }, type: "ssvc", }, }, { other: { content: { dateAdded: "2022-03-03", reference: "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-12232", }, type: "kev", }, }, ], providerMetadata: { dateUpdated: "2024-11-15T17:58:04.978Z", orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0", shortName: "CISA-ADP", }, title: "CISA ADP Vulnrichment", }, ], cna: { affected: [ { product: "Cisco IOS", vendor: "n/a", versions: [ { status: "affected", version: "Cisco IOS", }, ], }, ], datePublic: "2017-09-28T00:00:00", descriptions: [ { lang: "en", value: "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.", }, ], problemTypes: [ { descriptions: [ { cweId: "CWE-399", description: "CWE-399", lang: "en", type: "CWE", }, ], }, ], providerMetadata: { dateUpdated: "2017-09-29T09:57:01", orgId: "d1c1063e-7a18-46af-9102-31f8928bc633", shortName: "cisco", }, references: [ { tags: [ "x_refsource_CONFIRM", ], url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { name: "1039452", tags: [ "vdb-entry", "x_refsource_SECTRACK", ], url: "http://www.securitytracker.com/id/1039452", }, { name: "101044", tags: [ "vdb-entry", "x_refsource_BID", ], url: "http://www.securityfocus.com/bid/101044", }, ], x_legacyV4Record: { CVE_data_meta: { ASSIGNER: "psirt@cisco.com", ID: "CVE-2017-12232", STATE: "PUBLIC", }, affects: { vendor: { vendor_data: [ { product: { product_data: [ { product_name: "Cisco IOS", version: { version_data: [ { version_value: "Cisco IOS", }, ], }, }, ], }, vendor_name: "n/a", }, ], }, }, data_format: "MITRE", data_type: "CVE", data_version: "4.0", description: { description_data: [ { lang: "eng", value: "A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.", }, ], }, problemtype: { problemtype_data: [ { description: [ { lang: "eng", value: "CWE-399", }, ], }, ], }, references: { reference_data: [ { name: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", refsource: "CONFIRM", url: "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-rbip-dos", }, { name: "1039452", refsource: "SECTRACK", url: "http://www.securitytracker.com/id/1039452", }, { name: "101044", refsource: "BID", url: "http://www.securityfocus.com/bid/101044", }, ], }, }, }, }, cveMetadata: { assignerOrgId: "d1c1063e-7a18-46af-9102-31f8928bc633", assignerShortName: "cisco", cveId: "CVE-2017-12232", datePublished: "2017-09-28T07:00:00", dateReserved: "2017-08-03T00:00:00", dateUpdated: "2024-11-15T17:58:04.978Z", state: "PUBLISHED", }, dataType: "CVE_RECORD", dataVersion: "5.1", }