Vulnerability Name:

CVE-2017-12238

Assigned:2017-08-03
Published:2017-09-28
Updated:2017-10-06
Summary:A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS 15.0 through 15.4 for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory management issue in the affected software. An attacker could exploit this vulnerability by creating a large number of VPLS-generated MAC entries in the MAC address table of an affected device. A successful exploit could allow the attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a DoS condition. This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces. Cisco Bug IDs: CSCva61927.
CVSS v3 Severity:3.6 Low (CVSS v3 Vector: CVSS:3.0/AV:/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
Exploitability Metrics:Attack Vector (AV): 
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
4.3 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-399
References:Source: BID
Type: VENDOR_ADVISORY
101040

Source: SECTRACK
Type: VENDOR_ADVISORY
1039453

Source: CONFIRM
Type: VENDOR_ADVISORY
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-vpls

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios:15.1(1)sy4:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy4:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy9:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy1a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(1)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy4:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy8:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy6:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.4(1)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.0(1)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy6:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy5:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy10:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(1)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(1)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy7:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy5:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy4a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy0a:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    BACK
    cisco ios 15.1(1)sy4
    cisco ios 15.1(2)sy4
    cisco ios 15.1(2)sy1
    cisco ios 15.1(2)sy9
    cisco ios 15.1(1)sy1
    cisco ios 15.2(1)sy
    cisco ios 15.2(1)sy1a
    cisco ios 15.1(2)sy2
    cisco ios 15.3(1)sy2
    cisco ios 15.1(1)sy2
    cisco ios 15.2(1)sy4
    cisco ios 15.1(2)sy
    cisco ios 15.1(2)sy8
    cisco ios 15.1(1)sy6
    cisco ios 15.4(1)sy
    cisco ios 15.0(1)sy1
    cisco ios 15.2(2)sy2
    cisco ios 15.1(2)sy6
    cisco ios 15.2(1)sy2
    cisco ios 15.1(2)sy5
    cisco ios 15.1(1)sy3
    cisco ios 15.1(1)sy
    cisco ios 15.1(2)sy10
    cisco ios 15.1(2)sy3
    cisco ios 15.3(1)sy
    cisco ios 15.3(1)sy1
    cisco ios 15.2(2)sy
    cisco ios 15.1(2)sy7
    cisco ios 15.2(2)sy1
    cisco ios 15.2(1)sy3
    cisco ios 15.2(1)sy1
    cisco ios 15.1(1)sy5
    cisco ios 15.1(2)sy4a
    cisco ios 15.2(1)sy0a