Vulnerability Name:

CVE-2017-12222

Assigned:2017-08-03
Published:2017-09-28
Updated:2017-10-05
Summary:A vulnerability in the wireless controller manager of Cisco IOS XE could allow an unauthenticated, adjacent attacker to cause a restart of the switch and result in a denial of service (DoS) condition. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by submitting a crafted association request. An exploit could allow the attacker to cause the switch to restart. This vulnerability affects Cisco Catalyst 3650 and 3850 switches running IOS XE Software versions 16.1 through 16.3.3, and acting as wireless LAN controllers (WLC). Cisco Bug IDs: CSCvd45069.
CVSS v3 Severity:3.6 Low (CVSS v3 Vector: CVSS:3.0/AV:/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): 
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
6.5 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:6.1 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-399
References:Source: BID
Type: VENDOR_ADVISORY
101035

Source: SECTRACK
Type: VENDOR_ADVISORY
1039458

Source: CONFIRM
Type: VENDOR_ADVISORY
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-ios-xe

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios_xe:16.1.2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.2.3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.1.3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.1.3a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.2.2a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.3.2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.2.1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.1.4:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.2.2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios_xe:16.3.3:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    BACK
    cisco ios_xe 16.1.2
    cisco ios_xe 16.2.3
    cisco ios_xe 16.1.3
    cisco ios_xe 16.1.3a
    cisco ios_xe 16.3.1a
    cisco ios_xe 16.2.2a
    cisco ios_xe 16.1.1
    cisco ios_xe 16.3.2
    cisco ios_xe 16.2.1
    cisco ios_xe 16.1.4
    cisco ios_xe 16.2.2
    cisco ios_xe 16.3.1
    cisco ios_xe 16.3.3