Vulnerability Details : CVE-2017-12211
A vulnerability in the IPv6 Simple Network Management Protocol (SNMP) code of Cisco IOS and Cisco IOS XE Software could allow an authenticated, remote attacker to cause high CPU usage or a reload of the device. The vulnerability is due to IPv6 sub block corruption. An attacker could exploit this vulnerability by polling the affected device IPv6 information. An exploit could allow the attacker to trigger high CPU usage or a reload of the device. Known Affected Releases: Denali-16.3.1. Cisco Bug IDs: CSCvb14640.
Products affected by CVE-2017-12211
- cpe:2.3:o:cisco:ios:3.16.1:*:*:*:*:*:*:*
- cpe:2.3:o:cisco:ios_xe:3.16.1:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2017-12211
1.14%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 77 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2017-12211
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.3
|
MEDIUM | AV:N/AC:M/Au:S/C:N/I:N/A:C |
6.8
|
6.9
|
NIST | |
5.3
|
MEDIUM | CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H |
1.6
|
3.6
|
NIST |
CWE ids for CVE-2017-12211
-
Assigned by: ykramarz@cisco.com (Secondary)
References for CVE-2017-12211
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-snmp
Cisco IOS and Cisco IOS XE Software IPv6 SNMP Message Handling Denial of Service VulnerabilityVendor Advisory
-
http://www.securitytracker.com/id/1039290
Cisco IOS/IOS XE IPv6 SNMP Processing Flaw Lets Remote Authenticated Users Deny Service - SecurityTrackerThird Party Advisory;VDB Entry
-
http://www.securityfocus.com/bid/100648
Cisco IOS and Cisco IOS XE CVE-2017-12211 Denial of Service VulnerabilityThird Party Advisory;VDB Entry
-
https://quickview.cloudapps.cisco.com/quickview/bug/CSCvb14640
Cisco Bug: CSCvb14640 - Cisco IOS and Cisco IOS XE Software IPv6 SNMP Message Handling Denial of Service VulnerabilityVendor Advisory
Jump to