{"vulnerability": "cve-2017-12232", "sightings": [{"uuid": "6a0ea3e1-b492-4cae-8304-42607a39e88a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-12232", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2023-06-14T21:10:03.000000Z"}, {"uuid": "a085d08a-834a-42d7-947a-b103f9f6028d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-12232", "type": "seen", "source": "https://feedsin.space/feed/CISAKevBot/items/2971318", "content": "", "creation_timestamp": "2024-12-24T20:27:32.203151Z"}, {"uuid": "245e5972-aea7-4b17-9bc2-4d49c62debdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-12232", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:14.000000Z"}, {"uuid": "fc6673e6-8b50-4b52-b36b-f37479320d35", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2017-12232", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/5aab3b5c-86e7-4da9-93d3-73c4ea0f7dc4", "content": "", "creation_timestamp": "2026-02-02T12:28:16.089818Z"}, {"uuid": "596c6882-8f0c-46ac-9fde-15fcb69efd2f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2017-12232", "type": "seen", "source": "https://t.me/arpsyndicate/1235", "content": "#ExploitObserverAlert\n\nCVE-2017-12232\n\nDESCRIPTION: Exploit Observer has 3 entries related to CVE-2017-12232. A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS 15.0 through 15.6 could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a misclassification of Ethernet frames. An attacker could exploit this vulnerability by sending a crafted Ethernet frame to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvc03809.\n\nFIRST-EPSS: 0.001600000\nNVD-IS: 3.6\nNVD-ES: 2.8", "creation_timestamp": "2023-12-04T15:05:34.000000Z"}]}