CVE-2017-6627
Vulnerability from cvelistv5
Published
2017-09-07 21:00
Modified
2024-08-05 15:33
Severity ?
EPSS score ?
Summary
A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506.
References
▼ | URL | Tags | |
---|---|---|---|
ykramarz@cisco.com | http://www.securityfocus.com/bid/100644 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | http://www.securitytracker.com/id/1039289 | Third Party Advisory, VDB Entry | |
ykramarz@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp | Mitigation, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/100644 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039289 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp | Mitigation, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | Cisco IOS and Cisco IOS XE |
Version: Cisco IOS and Cisco IOS XE |
|
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2022-03-03
Due date: 2022-03-24
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://nvd.nist.gov/vuln/detail/CVE-2017-6627
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:33:20.480Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "100644", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100644" }, { "name": "1039289", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1039289" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IOS and Cisco IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and Cisco IOS XE" } ] } ], "datePublic": "2017-09-07T00:00:00", "descriptions": [ { "lang": "en", "value": "A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-399", "description": "CWE-399", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-08T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "100644", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100644" }, { "name": "1039289", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1039289" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6627", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and Cisco IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and Cisco IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-399" } ] } ] }, "references": { "reference_data": [ { "name": "100644", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100644" }, { "name": "1039289", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1039289" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6627", "datePublished": "2017-09-07T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-08-05T15:33:20.480Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "cisa_known_exploited": { "cveID": "CVE-2017-6627", "cwes": "[\"CWE-399\"]", "dateAdded": "2022-03-03", "dueDate": "2022-03-24", "knownRansomwareCampaignUse": "Unknown", "notes": "https://nvd.nist.gov/vuln/detail/CVE-2017-6627", "product": "IOS and IOS XE Software", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "A vulnerability in the UDP processing code of Cisco IOS and IOS XE could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and denial of service.", "vendorProject": "Cisco", "vulnerabilityName": "Cisco IOS Software and Cisco IOS XE Software UDP Packet Processing Denial-of-Service Vulnerability" }, "nvd": "{\"cve\":{\"id\":\"CVE-2017-6627\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2017-09-07T21:29:00.660\",\"lastModified\":\"2024-11-21T03:30:09.710\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en el c\u00f3digo de procesamiento UDP de Cisco IOS 15.1, 15.2 y 15.4, e OS XE 3.14 hasta la versi\u00f3n 3.18 podr\u00eda permitir que un atacante remoto sin autenticar provoque que la cola de entrada de un sistema afectado retenga paquetes UDP. Esto provoca una cola de paquetes en la interfaz y una denegaci\u00f3n de servicio. Esta vulnerabilidad se debe a cambios en la aplicaci\u00f3n Cisco IOS Software que crean sockets UDP y dejan los sockets inactivos sin cerrarlos. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes UDP con un puerto de destino 0 a un dispositivo afectado. Si se explota esta vulnerabilidad con \u00e9xito, un atacante podr\u00eda provocar que los paquetes UDP fuesen retenidos en la cola de interfaces de entrada, lo que dar\u00eda como resultado una condici\u00f3n DoS. La cola de interfaz de entrada dejar\u00e1 de retener paquetes UDP una vez que reciba 250 paquetes. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:N/A:P\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"cisaExploitAdd\":\"2022-03-03\",\"cisaActionDue\":\"2022-03-24\",\"cisaRequiredAction\":\"Apply updates per vendor instructions.\",\"cisaVulnerabilityName\":\"Cisco IOS Software and Cisco IOS XE Software UDP Packet Processing Denial-of-Service Vulnerability\",\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-399\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-404\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)gc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CF70487-4E51-4570-927B-1B74D73E9D58\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)gc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"242A4DC2-C9C7-4ACB-99F0-317959B0CA2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(2\\\\)gc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED4ECF5C-1B91-4B54-BAB4-2DF17A1BBF56\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(4\\\\)gc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CD00484-39D2-4CD5-ABEA-3C5AD9977BB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(4\\\\)gc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AAD9B95-0D54-49CA-824D-68175D6B4A8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.1\\\\(4\\\\)gc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B082C941-CE02-440F-8DD7-87873504B964\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)gc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98EB6A3F-DDAB-4FC6-A857-6E106E815505\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)gc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7741D6E0-2507-44D9-8476-AE11DADEC611\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(1\\\\)gc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0318BB57-8001-4F2A-954C-AD8DB2A94356\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(2\\\\)gc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C89D14BC-1718-4AE9-B107-1709C2CE965E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)gc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D80852CE-8D91-4E85-A97F-C7A9AF5278CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3\\\\)gc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF777880-43BF-4D4A-9BA1-B2E925B5DE11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(3r\\\\)gca:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB015852-A945-4801-93AA-6C562AFAB80D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)gc:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E3714E18-9A21-4D04-BB5E-0299AF443E2E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)gc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F6FE61C7-3B61-4085-AD91-137459DA29D0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)gc2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71080D8B-BC81-4CDF-8626-D0F35DA40AEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.2\\\\(4\\\\)gc3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF10596D-457A-4DA8-8037-5E92E1D39232\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1EE552E-226C-46DE-9861-CB148AD8FB44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF02C8E-9BB2-4DC2-8BF1-932835191F09\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(1\\\\)t4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C5AC88EB-7A67-4CDE-9C69-94734966E677\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74E1226B-46CF-4C82-911A-86C818A75DFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"100DA24F-464E-4273-83DF-6428D0ED6641\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(2\\\\)t2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"063C0C47-25EB-4AA4-9332-8E43CD60FF39\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C85BAAF-819B-40E7-9099-04AA8D9AB114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED684DB4-527A-4268-B197-4719B0178429\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88F41406-0F55-4D74-A4F6-4ABD5A803907\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8CF9C9AE-B5A6-4B03-9ED9-FDBB40CE5BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7082C083-7517-4CD4-BF95-CC7AF08D4053\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"370EF3DC-151F-4724-A026-3AD8ED6D801C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B8FB86F-2A89-413B-BED7-97E3D392804E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"005EAD76-34BE-4E3F-8840-23F613661FE8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m6a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2595B3E3-7FD4-4EFF-98A2-89156A657A0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios:15.4\\\\(3\\\\)m7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB998A1F-BAEA-4B8F-BE49-1C282ED3952E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9247665-BBE7-4DEF-B97B-4981A0EA5CE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61E0102-B9B6-41F4-9041-0A5F144D849A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A076E1F-3457-410A-8AB6-64416ECB20A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD93CD1-4188-40B7-A20E-9C3FE8344A27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2972E680-5A19-4858-9B35-0B959ED319A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BFE916-916F-4936-A331-21A0E8193920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EC9A19-26E6-4E69-B4E7-852CB6327EAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C5484A4-D116-4B79-8369-47979E20AACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5568EABF-8F43-4A87-8DE4-A03E9065BE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E5BB91-B5E7-4961-87DC-26596E5EDED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3822447-EB80-4DF2-B7F2-471F55BA99C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0B441A-3A09-4A58-8A40-D463003A50BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E1A64A-204D-4567-A2DC-EFEB2AE62B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970FD986-6D0E-441C-9BF3-C66A25763A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EEFD3AD-EFA2-4808-801E-B98E4C63AA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1826C997-6D5D-480E-A12E-3048B6C61216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D136C95-F837-49AD-82B3-81C25F68D0EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B3F96-B342-4AFC-A511-7A735B961ECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DED2D791-4142-4B9E-8401-6B63357536B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBEF4B2-EA12-445A-823E-E0E5343A405E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"844E7CEC-5CB6-47AE-95F7-75693347C08E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"147A245E-9A5D-4178-A1AC-5B0D41C3B730\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12793F39-13C4-4DBC-9B78-FE361BDDF89D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AEF94C7-CEE6-4696-9F1D-549639A831C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"876767C7-0196-4226-92B1-DDE851B53655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE390091-D382-4436-BBB4-D4C33E4F6714\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE81AA43-88D4-4EFC-B8F6-A41EFF437819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BEBCBF7-D1CF-488F-BB3E-F864F901A96A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8CCA19-1D1C-45C0-A1A0-CED5885AD580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4063CCF8-19BE-4411-B71B-147BB146700B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.3vs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA08C168-48BE-41ED-A3BD-87BAE27A1351\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/100644\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039289\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/100644\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039289\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mitigation\",\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.