8.6

CVE-2017-3883

A vulnerability in the authentication, authorization, and accounting (AAA) implementation of Cisco Firepower Extensible Operating System (FXOS) and NX-OS System Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability occurs because AAA processes prevent the NX-OS System Manager from receiving keepalive messages when an affected device receives a high rate of login attempts, such as in a brute-force login attack. System memory can run low on the FXOS devices under the same conditions, which could cause the AAA process to unexpectedly restart or cause the device to reload. An attacker could exploit this vulnerability by performing a brute-force login attack against a device that is configured with AAA security services. A successful exploit could allow the attacker to cause the affected device to reload. This vulnerability affects the following Cisco products if they are running Cisco FXOS or NX-OS System Software that is configured for AAA services: Firepower 4100 Series Next-Generation Firewall, Firepower 9300 Security Appliance, Multilayer Director Switches, Nexus 1000V Series Switches, Nexus 1100 Series Cloud Services Platforms, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, Unified Computing System (UCS) 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCuq58760, CSCuq71257, CSCur97432, CSCus05214, CSCux54898, CSCvc33141, CSCvd36971, CSCve03660.

Data is provided by the National Vulnerability Database (NVD)
CiscoFirepower Extensible Operating System Version <= 2.3
   CiscoFirepower 4100 Version-
CiscoFxos Version2.3
   CiscoFirepower 9300 Version-
CiscoNx-os Version5.2
   CiscoMds 9000 Version-
CiscoNx-os Version6.2
   CiscoMds 9000 Version-
CiscoNx-os Version6.3
   CiscoMds 9000 Version-
CiscoNx-os Version7.3
   CiscoMds 9000 Version-
CiscoNx-os Version8.1
   CiscoMds 9000 Version-
CiscoNx-os Version8.2
   CiscoMds 9000 Version-
CiscoNx-os Version <= 4.1
   CiscoNexus 1000v Version-
   CiscoNexus 1100v Version-
CiscoNx-os Version5.2
   CiscoNexus 1000v Version-
   CiscoNexus 1100v Version-
CiscoNx-os Version <= 6.0
   CiscoNexus 3000 Version-
   CiscoNexus 3016 Version-
   CiscoNexus 3016q Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064 Version-
   CiscoNexus 3064t Version-
   CiscoNexus 3064x Version-
CiscoNx-os Version7.0
   CiscoNexus 3000 Version-
   CiscoNexus 3016 Version-
   CiscoNexus 3016q Version-
   CiscoNexus 3048 Version-
   CiscoNexus 3064 Version-
   CiscoNexus 3064t Version-
   CiscoNexus 3064x Version-
CiscoNx-os Version <= 5.2
   CiscoNexus 2000 Version-
   CiscoNexus 5000 Version-
   CiscoNexus 5010 Version-
   CiscoNexus 5010p Switch Version-
   CiscoNexus 5500 Version-
   CiscoNexus 5548p Version-
   CiscoNexus 5548up Version-
   CiscoNexus 5596t Version-
   CiscoNexus 5596up Version-
   CiscoNexus 5600 Version-
   CiscoNexus 56128p Version-
   CiscoNexus 5624q Version-
   CiscoNexus 5648q Version-
   CiscoNexus 5672up Version-
   CiscoNexus 5696q Version-
   CiscoNexus 6000 Version-
   CiscoNexus 6001 Version-
   CiscoNexus 6004 Version-
   CiscoNexus 6004x Version-
CiscoNx-os Version6.1
   CiscoNexus 9000 Version-
CiscoNx-os Version7.0
   CiscoNexus 9000 Version-
CiscoNx-os Version7.0
   Cisco9500 R Version-
CiscoNx-os Version <= 2.2
   CiscoUcs 6100 Version-
   CiscoUcs 6200 Version-
   CiscoUcs 6300 Version-
CiscoNx-os Version2.5
   CiscoUcs 6100 Version-
   CiscoUcs 6200 Version-
   CiscoUcs 6300 Version-
CiscoNx-os Version3.0
   CiscoUcs 6100 Version-
   CiscoUcs 6200 Version-
   CiscoUcs 6300 Version-
CiscoNx-os Version3.1
   CiscoUcs 6100 Version-
   CiscoUcs 6200 Version-
   CiscoUcs 6300 Version-
CiscoNx-os Version3.2
   CiscoUcs 6100 Version-
   CiscoUcs 6200 Version-
   CiscoUcs 6300 Version-
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 2.62% 0.851
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 8.6 3.9 4
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-770 Allocation of Resources Without Limits or Throttling

The product allocates a reusable resource or group of resources on behalf of an actor without imposing any restrictions on the size or number of resources that can be allocated, in violation of the intended security policy for that actor.