7.8
CVE-2017-12233
- EPSS 13.01%
- Veröffentlicht 29.09.2017 01:34:48
- Zuletzt bearbeitet 20.04.2025 01:37:25
- Quelle psirt@cisco.com
- Teams Watchlist Login
- Unerledigt Login
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
Cisco ≫ Ios Version >= 12.4 <= 15.6
Cisco ≫ 1000 Integrated Services Router Version-
Cisco ≫ 1100-4g Integrated Services Router Version-
Cisco ≫ 1100-4gltegb Integrated Services Router Version-
Cisco ≫ 1100-4gltena Integrated Services Router Version-
Cisco ≫ 1100-4p Version-
Cisco ≫ 1100-4p Integrated Services Router Version-
Cisco ≫ 1100-6g Integrated Services Router Version-
Cisco ≫ 1100-8p Version-
Cisco ≫ 1100-8p Integrated Services Router Version-
Cisco ≫ 1100-lte Integrated Services Router Version-
Cisco ≫ 1100 Integrated Services Router Version-
Cisco ≫ 1100 Terminal Services Gateways Version-
Cisco ≫ 1101-4p Version-
Cisco ≫ 1101-4p Integrated Services Router Version-
Cisco ≫ 1101 Integrated Services Router Version-
Cisco ≫ 1109-2p Version-
Cisco ≫ 1109-4p Version-
Cisco ≫ 1111-4pwe Version-
Cisco ≫ 1111-8pwb Version-
Cisco ≫ 1111x-8p Version-
Cisco ≫ 1113-8plteeawe Version-
Cisco ≫ 1113-8pmwe Version-
Cisco ≫ 1113-8pwe Version-
Cisco ≫ 1116-4plteeawe Version-
Cisco ≫ 1116-4pwe Version-
Cisco ≫ 1117-4plteeawe Version-
Cisco ≫ 1117-4pmlteeawe Version-
Cisco ≫ 1117-4pmwe Version-
Cisco ≫ 1117-4pwe Version-
Cisco ≫ 1120 Version-
Cisco ≫ 1120 Connected Grid Router Version-
Cisco ≫ 1120 Integrated Services Router Version-
Cisco ≫ 1131 Integrated Services Router Version-
Cisco ≫ 1160 Integrated Services Router Version-
Cisco ≫ 1801 Integrated Service Router Version-
Cisco ≫ 1802 Integrated Service Router Version-
Cisco ≫ 1803 Integrated Service Router Version-
Cisco ≫ 1811 Integrated Service Router Version-
Cisco ≫ 1812 Integrated Service Router Version-
Cisco ≫ 1841 Integrated Service Router Version-
Cisco ≫ 1861 Integrated Service Router Version-
Cisco ≫ 1905 Integrated Services Router Version-
Cisco ≫ 1906c Integrated Services Router Version-
Cisco ≫ 1921 Integrated Services Router Version-
Cisco ≫ 1941 Integrated Services Router Version-
Cisco ≫ 1941w Integrated Services Router Version-
Cisco ≫ Catalyst Ie3200 Rugged Switch Version-
Cisco ≫ Catalyst Ie3300 Rugged Switch Version-
Cisco ≫ Catalyst Ie3400 Heavy Duty Switch Version-
Cisco ≫ Catalyst Ie3400 Rugged Switch Version-
Cisco ≫ Catalyst Ie9300 Version-
Cisco ≫ Esr-6300-con-k9 Version-
Cisco ≫ Esr-6300-ncp-k9 Version-
Cisco ≫ 1100-4g Integrated Services Router Version-
Cisco ≫ 1100-4gltegb Integrated Services Router Version-
Cisco ≫ 1100-4gltena Integrated Services Router Version-
Cisco ≫ 1100-4p Version-
Cisco ≫ 1100-4p Integrated Services Router Version-
Cisco ≫ 1100-6g Integrated Services Router Version-
Cisco ≫ 1100-8p Version-
Cisco ≫ 1100-8p Integrated Services Router Version-
Cisco ≫ 1100-lte Integrated Services Router Version-
Cisco ≫ 1100 Integrated Services Router Version-
Cisco ≫ 1100 Terminal Services Gateways Version-
Cisco ≫ 1101-4p Version-
Cisco ≫ 1101-4p Integrated Services Router Version-
Cisco ≫ 1101 Integrated Services Router Version-
Cisco ≫ 1109-2p Version-
Cisco ≫ 1109-4p Version-
Cisco ≫ 1111-4pwe Version-
Cisco ≫ 1111-8pwb Version-
Cisco ≫ 1111x-8p Version-
Cisco ≫ 1113-8plteeawe Version-
Cisco ≫ 1113-8pmwe Version-
Cisco ≫ 1113-8pwe Version-
Cisco ≫ 1116-4plteeawe Version-
Cisco ≫ 1116-4pwe Version-
Cisco ≫ 1117-4plteeawe Version-
Cisco ≫ 1117-4pmlteeawe Version-
Cisco ≫ 1117-4pmwe Version-
Cisco ≫ 1117-4pwe Version-
Cisco ≫ 1120 Version-
Cisco ≫ 1120 Connected Grid Router Version-
Cisco ≫ 1120 Integrated Services Router Version-
Cisco ≫ 1131 Integrated Services Router Version-
Cisco ≫ 1160 Integrated Services Router Version-
Cisco ≫ 1801 Integrated Service Router Version-
Cisco ≫ 1802 Integrated Service Router Version-
Cisco ≫ 1803 Integrated Service Router Version-
Cisco ≫ 1811 Integrated Service Router Version-
Cisco ≫ 1812 Integrated Service Router Version-
Cisco ≫ 1841 Integrated Service Router Version-
Cisco ≫ 1861 Integrated Service Router Version-
Cisco ≫ 1905 Integrated Services Router Version-
Cisco ≫ 1906c Integrated Services Router Version-
Cisco ≫ 1921 Integrated Services Router Version-
Cisco ≫ 1941 Integrated Services Router Version-
Cisco ≫ 1941w Integrated Services Router Version-
Cisco ≫ Catalyst Ie3200 Rugged Switch Version-
Cisco ≫ Catalyst Ie3300 Rugged Switch Version-
Cisco ≫ Catalyst Ie3400 Heavy Duty Switch Version-
Cisco ≫ Catalyst Ie3400 Rugged Switch Version-
Cisco ≫ Catalyst Ie9300 Version-
Cisco ≫ Esr-6300-con-k9 Version-
Cisco ≫ Esr-6300-ncp-k9 Version-
03.03.2022: CISA Known Exploited Vulnerabilities (KEV) Catalog
Cisco IOS Software Common Industrial Protocol Request Denial-of-Service Vulnerability
SchwachstelleThere is a vulnerability in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service.
BeschreibungApply updates per vendor instructions.
Erforderliche MaßnahmenTyp | Quelle | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 13.01% | 0.938 |
Quelle | Base Score | Exploit Score | Impact Score | Vector String |
---|---|---|---|---|
nvd@nist.gov | 7.5 | 3.9 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
|
nvd@nist.gov | 7.8 | 10 | 6.9 |
AV:N/AC:L/Au:N/C:N/I:N/A:C
|
CWE-20 Improper Input Validation
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.