Vulnerability Name:

CVE-2017-12233 (CCN-132669)

Assigned:2017-09-27
Published:2017-09-27
Updated:2019-10-09
Summary:Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuz95334.
CVSS v3 Severity:7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
8.6 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
7.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:7.8 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
7.8 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-20
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2017-12233

Source: BID
Type: Third Party Advisory, VDB Entry
101038

Source: CCN
Type: BID-101038
Cisco IOS Software Common Industrial Protocol Multiple Denial of Service Vulnerabilities

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1039459

Source: XF
Type: UNKNOWN
cisco-ios-cve201712233-dos(132669)

Source: CCN
Type: Cisco Security Advisory cisco-sa-20170927-cip
Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerabilities

Source: CONFIRM
Type: Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip

Source: CCN
Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY
KNOWN EXPLOITED VULNERABILITIES CATALOG

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios:12.4(25e)jao3a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.4(25e)jao20s:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.4(25e)jap1n:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:12.4(25e)jap9:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.0(2)sqd7:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sg7a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)e3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)e5b:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)eb:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)eb1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)eb2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(3)ex:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(4)ec:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(4)ec1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(4)ec2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(5)e:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(5)e2a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(5)e2b:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(5a)e1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jbb6a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jc7:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jc50:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jc51:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jca7:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jda3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)je1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jnc4:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jnd2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jnp2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jpb:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jpb2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(3)jpc3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.6(1)s1a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.6(2)s0a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.6(2)s2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.6(2)s3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.6(2)sp1b:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.6(2)sp1c:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.6(2)sp2a:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:cisco:ios:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco ios 12.4(25e)jao3a
    cisco ios 12.4(25e)jao20s
    cisco ios 12.4(25e)jap1n
    cisco ios 12.4(25e)jap9
    cisco ios 15.0(2)sqd7
    cisco ios 15.1(2)sg7a
    cisco ios 15.2(2)e3
    cisco ios 15.2(2)e5b
    cisco ios 15.2(2)eb
    cisco ios 15.2(2)eb1
    cisco ios 15.2(2)eb2
    cisco ios 15.2(3)ex
    cisco ios 15.2(4)ec
    cisco ios 15.2(4)ec1
    cisco ios 15.2(4)ec2
    cisco ios 15.2(5)e
    cisco ios 15.2(5)e2a
    cisco ios 15.2(5)e2b
    cisco ios 15.2(5a)e1
    cisco ios 15.3(3)jbb6a
    cisco ios 15.3(3)jc7
    cisco ios 15.3(3)jc50
    cisco ios 15.3(3)jc51
    cisco ios 15.3(3)jca7
    cisco ios 15.3(3)jda3
    cisco ios 15.3(3)je1
    cisco ios 15.3(3)jnc4
    cisco ios 15.3(3)jnd2
    cisco ios 15.3(3)jnp2
    cisco ios 15.3(3)jpb
    cisco ios 15.3(3)jpb2
    cisco ios 15.3(3)jpc3
    cisco ios 15.6(1)s1a
    cisco ios 15.6(2)s0a
    cisco ios 15.6(2)s2
    cisco ios 15.6(2)s3
    cisco ios 15.6(2)sp1b
    cisco ios 15.6(2)sp1c
    cisco ios 15.6(2)sp2a
    cisco ios *