Vulnerability Name:

CVE-2017-12238 (CCN-132678)

Assigned:2017-09-27
Published:2017-09-27
Updated:2019-10-09
Summary:A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS 15.0 through 15.4 for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory management issue in the affected software. An attacker could exploit this vulnerability by creating a large number of VPLS-generated MAC entries in the MAC address table of an affected device. A successful exploit could allow the attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a DoS condition. This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces. Cisco Bug IDs: CSCva61927.
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.4 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Adjacent
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:3.3 Low (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
6.1 Medium (CCN CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Adjacent_Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2017-12238

Source: BID
Type: Third Party Advisory, VDB Entry
101040

Source: CCN
Type: BID-101040
Cisco IOS Software for Cisco Catalyst 6800 Series Switches Denial of Service Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1039453

Source: XF
Type: UNKNOWN
cisco-ios-cve201712238-dos(132678)

Source: CCN
Type: Cisco Security Advisory cisco-sa-20170927-vpls
Cisco IOS Software for Cisco Catalyst 6800 Series Switches VPLS Denial of Service Vulnerability

Source: CONFIRM
Type: Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-vpls

Source: CCN
Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY
KNOWN EXPLOITED VULNERABILITIES CATALOG

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios:15.0(1)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy4:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy5:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(1)sy6:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy4:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy4a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy5:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy6:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy7:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy8:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy9:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.1(2)sy10:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy0a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy1a:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy3:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(1)sy4:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.2(2)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(1)sy:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(1)sy1:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.3(1)sy2:*:*:*:*:*:*:*
  • OR cpe:/o:cisco:ios:15.4(1)sy:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:cisco:ios:*:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco ios 15.0(1)sy1
    cisco ios 15.1(1)sy
    cisco ios 15.1(1)sy1
    cisco ios 15.1(1)sy2
    cisco ios 15.1(1)sy3
    cisco ios 15.1(1)sy4
    cisco ios 15.1(1)sy5
    cisco ios 15.1(1)sy6
    cisco ios 15.1(2)sy
    cisco ios 15.1(2)sy1
    cisco ios 15.1(2)sy2
    cisco ios 15.1(2)sy3
    cisco ios 15.1(2)sy4
    cisco ios 15.1(2)sy4a
    cisco ios 15.1(2)sy5
    cisco ios 15.1(2)sy6
    cisco ios 15.1(2)sy7
    cisco ios 15.1(2)sy8
    cisco ios 15.1(2)sy9
    cisco ios 15.1(2)sy10
    cisco ios 15.2(1)sy
    cisco ios 15.2(1)sy0a
    cisco ios 15.2(1)sy1
    cisco ios 15.2(1)sy1a
    cisco ios 15.2(1)sy2
    cisco ios 15.2(1)sy3
    cisco ios 15.2(1)sy4
    cisco ios 15.2(2)sy
    cisco ios 15.2(2)sy1
    cisco ios 15.2(2)sy2
    cisco ios 15.3(1)sy
    cisco ios 15.3(1)sy1
    cisco ios 15.3(1)sy2
    cisco ios 15.4(1)sy
    cisco ios *