CVE-2017-12239
Vulnerability from cvelistv5
Published
2017-09-28 07:00
Modified
2024-08-05 18:28
Severity ?
Summary
A vulnerability in motherboard console ports of line cards for Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, physical attacker to access an affected device's operating system. The vulnerability exists because an engineering console port is available on the motherboard of the affected line cards. An attacker could exploit this vulnerability by physically connecting to the console port on the line card. A successful exploit could allow the attacker to gain full access to the affected device's operating system. This vulnerability affects only Cisco ASR 1000 Series Routers that have removable line cards and Cisco cBR-8 Converged Broadband Routers, if they are running certain Cisco IOS XE 3.16 through 16.5 releases. Cisco Bug IDs: CSCvc65866, CSCve77132.
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-05T18:28:16.611Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1039454",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1039454"
          },
          {
            "name": "1039455",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1039455"
          },
          {
            "name": "101042",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/101042"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "Cisco IOS XE",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "Cisco IOS XE"
            }
          ]
        }
      ],
      "datePublic": "2017-09-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A vulnerability in motherboard console ports of line cards for Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, physical attacker to access an affected device\u0027s operating system. The vulnerability exists because an engineering console port is available on the motherboard of the affected line cards. An attacker could exploit this vulnerability by physically connecting to the console port on the line card. A successful exploit could allow the attacker to gain full access to the affected device\u0027s operating system. This vulnerability affects only Cisco ASR 1000 Series Routers that have removable line cards and Cisco cBR-8 Converged Broadband Routers, if they are running certain Cisco IOS XE 3.16 through 16.5 releases. Cisco Bug IDs: CSCvc65866, CSCve77132."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-264",
              "description": "CWE-264",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-29T09:57:01",
        "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
        "shortName": "cisco"
      },
      "references": [
        {
          "name": "1039454",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1039454"
        },
        {
          "name": "1039455",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1039455"
        },
        {
          "name": "101042",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/101042"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@cisco.com",
          "ID": "CVE-2017-12239",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cisco IOS XE",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "Cisco IOS XE"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A vulnerability in motherboard console ports of line cards for Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, physical attacker to access an affected device\u0027s operating system. The vulnerability exists because an engineering console port is available on the motherboard of the affected line cards. An attacker could exploit this vulnerability by physically connecting to the console port on the line card. A successful exploit could allow the attacker to gain full access to the affected device\u0027s operating system. This vulnerability affects only Cisco ASR 1000 Series Routers that have removable line cards and Cisco cBR-8 Converged Broadband Routers, if they are running certain Cisco IOS XE 3.16 through 16.5 releases. Cisco Bug IDs: CSCvc65866, CSCve77132."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-264"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1039454",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1039454"
            },
            {
              "name": "1039455",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1039455"
            },
            {
              "name": "101042",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/101042"
            },
            {
              "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc",
              "refsource": "CONFIRM",
              "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
    "assignerShortName": "cisco",
    "cveId": "CVE-2017-12239",
    "datePublished": "2017-09-28T07:00:00",
    "dateReserved": "2017-08-03T00:00:00",
    "dateUpdated": "2024-08-05T18:28:16.611Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"246251E8-7D4E-4CD4-8D4F-BF360780FA36\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"09F35F75-75E8-4A20-94C4-5908E404C8CB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C01C1D8-A191-45B7-A6C5-EE225F05A49E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16D7ACF1-6A30-4D6E-AA69-D2F365E2791C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E50FF89-8E71-4EA0-9AEC-2F800ED9D995\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3F6E9386-30B4-4E86-9676-E7E005274048\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E70C455-E41C-4B17-847A-5F4281139252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DD0A60B-6848-4B9A-B11D-2C2952D2D48C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64A07329-3A7D-4483-AE69-4786FEB23D92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F84E4463-DB0F-4B06-B403-B3606B386F02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9247665-BBE7-4DEF-B97B-4981A0EA5CE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E61E0102-B9B6-41F4-9041-0A5F144D849A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A076E1F-3457-410A-8AB6-64416ECB20A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAD93CD1-4188-40B7-A20E-9C3FE8344A27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2972E680-5A19-4858-9B35-0B959ED319A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BFE916-916F-4936-A331-21A0E8193920\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0EC9A19-26E6-4E69-B4E7-852CB6327EAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5C5484A4-D116-4B79-8369-47979E20AACA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"97410577-A005-49B6-981C-535B3484E72F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5568EABF-8F43-4A87-8DE4-A03E9065BE53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0E5BB91-B5E7-4961-87DC-26596E5EDED7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D3822447-EB80-4DF2-B7F2-471F55BA99C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA0B441A-3A09-4A58-8A40-D463003A50BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51E1A64A-204D-4567-A2DC-EFEB2AE62B54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"970FD986-6D0E-441C-9BF3-C66A25763A7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7EEFD3AD-EFA2-4808-801E-B98E4C63AA76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1826C997-6D5D-480E-A12E-3048B6C61216\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D136C95-F837-49AD-82B3-81C25F68D0EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C35B3F96-B342-4AFC-A511-7A735B961ECD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E203E52-0A3A-4910-863D-05FEF537C9B8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DED2D791-4142-4B9E-8401-6B63357536B0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4B6442B5-A87E-493B-98D5-F954B5A001BA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8794DA1D-9EE8-4139-B8E9-061A73CFD5F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9FBEF4B2-EA12-445A-823E-E0E5343A405E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51EAC484-1C4F-4CA8-B8E1-6EE0E9497A4A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0BC5E30-71D2-4C17-A1BA-0850A9BC7D50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"844E7CEC-5CB6-47AE-95F7-75693347C08E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12793F39-13C4-4DBC-9B78-FE361BDDF89D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AEF94C7-CEE6-4696-9F1D-549639A831C2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"876767C7-0196-4226-92B1-DDE851B53655\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0141D67B-632F-48ED-8837-4CC799616C57\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE390091-D382-4436-BBB4-D4C33E4F6714\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE81AA43-88D4-4EFC-B8F6-A41EFF437819\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C18E6308-7A34-43E3-9AD8-5FB52B31ACB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"80EE163D-D9EC-46A1-826A-54F8F3A3FFBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE3170E3-0BCC-4C5F-8E6C-5E91E8C4E7A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CCDB353-DD15-4C91-AD2A-73649C012E08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D7DAAE1-BB3F-4FBA-A6ED-3BABC9196C1C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6BEBCBF7-D1CF-488F-BB3E-F864F901A96A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"06BBE88E-FEFB-4B90-91D1-4F053FA0EA47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BD8CCA19-1D1C-45C0-A1A0-CED5885AD580\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"014224BF-926E-470C-A133-84036D8AD533\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"77993343-0394-413F-ABF9-C1215E9AD800\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0699DD6E-BA74-4814-93AB-300329C9D032\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2E2D781-2684-45F1-AC52-636572A0DCA8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"479FB47B-AF2E-4FCB-8DE0-400BF325666C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF2B4C78-5C31-4F3D-9639-305E15576E79\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"13CB889F-B064-4CAC-99AC-903745ACA566\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8F11B703-8A0F-47ED-AA70-951FF78B94A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE7B2557-821D-4E05-B5C3-67192573D97D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E16D266-108F-4F8A-998D-F1CA25F2EAAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"41D55481-C80E-4400-9C3D-9F6B1F7F13CE\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in motherboard console ports of line cards for Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, physical attacker to access an affected device\u0027s operating system. The vulnerability exists because an engineering console port is available on the motherboard of the affected line cards. An attacker could exploit this vulnerability by physically connecting to the console port on the line card. A successful exploit could allow the attacker to gain full access to the affected device\u0027s operating system. This vulnerability affects only Cisco ASR 1000 Series Routers that have removable line cards and Cisco cBR-8 Converged Broadband Routers, if they are running certain Cisco IOS XE 3.16 through 16.5 releases. Cisco Bug IDs: CSCvc65866, CSCve77132.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad en los puertos de la consola de la placa base de las tarjetas de l\\u00ednea para Cisco ASR 1000 Series Aggregation Services Routers y Cisco cBR-8 Converged Broadband Routers podr\\u00eda permitir que un atacante f\\u00edsico no autenticado acceda al sistema operativo del dispositivo afectado. Existe una vulnerabilidad en la que un puerto de consola est\\u00e1 disponible en la placa base de las tarjetas de l\\u00ednea afectadas. Un atacante podr\\u00eda explotar esta vulnerabilidad conect\\u00e1ndose f\\u00edsicamente al puerto de consola en la tarjeta de l\\u00ednea. Una explotaci\\u00f3n exitosa podr\\u00eda permitir que un atacante obtenga acceso total al sistema operativo del dispositivo afectado. Esta vulnerabilidad afecta a los routers de la serie ASR 1000 de Cisco que tienen tarjetas de l\\u00ednea extra\\u00edbles y routers Cisco cBR-8 Converged Broadband, si ejecutan determinadas distribuciones de Cisco IOS XE desde la 3.16 hasta la 16.5. Cisco Bug IDs: CSCvc65866, CSCve77132.\"}]",
      "id": "CVE-2017-12239",
      "lastModified": "2024-11-21T03:09:06.343",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.8, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"PHYSICAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2017-09-29T01:34:49.030",
      "references": "[{\"url\": \"http://www.securityfocus.com/bid/101042\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1039454\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1039455\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/101042\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1039454\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1039455\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "ykramarz@cisco.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"ykramarz@cisco.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-264\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-798\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2017-12239\",\"sourceIdentifier\":\"ykramarz@cisco.com\",\"published\":\"2017-09-29T01:34:49.030\",\"lastModified\":\"2024-11-21T03:09:06.343\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in motherboard console ports of line cards for Cisco ASR 1000 Series Aggregation Services Routers and Cisco cBR-8 Converged Broadband Routers could allow an unauthenticated, physical attacker to access an affected device\u0027s operating system. The vulnerability exists because an engineering console port is available on the motherboard of the affected line cards. An attacker could exploit this vulnerability by physically connecting to the console port on the line card. A successful exploit could allow the attacker to gain full access to the affected device\u0027s operating system. This vulnerability affects only Cisco ASR 1000 Series Routers that have removable line cards and Cisco cBR-8 Converged Broadband Routers, if they are running certain Cisco IOS XE 3.16 through 16.5 releases. Cisco Bug IDs: CSCvc65866, CSCve77132.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad en los puertos de la consola de la placa base de las tarjetas de l\u00ednea para Cisco ASR 1000 Series Aggregation Services Routers y Cisco cBR-8 Converged Broadband Routers podr\u00eda permitir que un atacante f\u00edsico no autenticado acceda al sistema operativo del dispositivo afectado. Existe una vulnerabilidad en la que un puerto de consola est\u00e1 disponible en la placa base de las tarjetas de l\u00ednea afectadas. Un atacante podr\u00eda explotar esta vulnerabilidad conect\u00e1ndose f\u00edsicamente al puerto de consola en la tarjeta de l\u00ednea. Una explotaci\u00f3n exitosa podr\u00eda permitir que un atacante obtenga acceso total al sistema operativo del dispositivo afectado. Esta vulnerabilidad afecta a los routers de la serie ASR 1000 de Cisco que tienen tarjetas de l\u00ednea extra\u00edbles y routers Cisco cBR-8 Converged Broadband, si ejecutan determinadas distribuciones de Cisco IOS XE desde la 3.16 hasta la 16.5. Cisco Bug IDs: CSCvc65866, CSCve77132.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"PHYSICAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"ykramarz@cisco.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-264\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-798\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"246251E8-7D4E-4CD4-8D4F-BF360780FA36\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"09F35F75-75E8-4A20-94C4-5908E404C8CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C01C1D8-A191-45B7-A6C5-EE225F05A49E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.2as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16D7ACF1-6A30-4D6E-AA69-D2F365E2791C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E50FF89-8E71-4EA0-9AEC-2F800ED9D995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3F6E9386-30B4-4E86-9676-E7E005274048\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E70C455-E41C-4B17-847A-5F4281139252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.5as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DD0A60B-6848-4B9A-B11D-2C2952D2D48C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64A07329-3A7D-4483-AE69-4786FEB23D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.6as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F84E4463-DB0F-4B06-B403-B3606B386F02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.6s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"665ACEAC-AE81-40F7-8A01-E8DB9DD7DD7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9247665-BBE7-4DEF-B97B-4981A0EA5CE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61E0102-B9B6-41F4-9041-0A5F144D849A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A076E1F-3457-410A-8AB6-64416ECB20A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD93CD1-4188-40B7-A20E-9C3FE8344A27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2972E680-5A19-4858-9B35-0B959ED319A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BFE916-916F-4936-A331-21A0E8193920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EC9A19-26E6-4E69-B4E7-852CB6327EAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C5484A4-D116-4B79-8369-47979E20AACA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"97410577-A005-49B6-981C-535B3484E72F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0bs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3420FB4D-8A6A-4B37-A4AE-7B35BEEEAF71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5568EABF-8F43-4A87-8DE4-A03E9065BE53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E5BB91-B5E7-4961-87DC-26596E5EDED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D3822447-EB80-4DF2-B7F2-471F55BA99C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0B441A-3A09-4A58-8A40-D463003A50BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51E1A64A-204D-4567-A2DC-EFEB2AE62B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970FD986-6D0E-441C-9BF3-C66A25763A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7EEFD3AD-EFA2-4808-801E-B98E4C63AA76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1826C997-6D5D-480E-A12E-3048B6C61216\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D136C95-F837-49AD-82B3-81C25F68D0EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C35B3F96-B342-4AFC-A511-7A735B961ECD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4cs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E203E52-0A3A-4910-863D-05FEF537C9B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DED2D791-4142-4B9E-8401-6B63357536B0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4es:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4B6442B5-A87E-493B-98D5-F954B5A001BA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4gs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8794DA1D-9EE8-4139-B8E9-061A73CFD5F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FBEF4B2-EA12-445A-823E-E0E5343A405E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.5as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EAC484-1C4F-4CA8-B8E1-6EE0E9497A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.5bs:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0BC5E30-71D2-4C17-A1BA-0850A9BC7D50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"844E7CEC-5CB6-47AE-95F7-75693347C08E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12793F39-13C4-4DBC-9B78-FE361BDDF89D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AEF94C7-CEE6-4696-9F1D-549639A831C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"876767C7-0196-4226-92B1-DDE851B53655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0141D67B-632F-48ED-8837-4CC799616C57\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE390091-D382-4436-BBB4-D4C33E4F6714\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE81AA43-88D4-4EFC-B8F6-A41EFF437819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.0sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18E6308-7A34-43E3-9AD8-5FB52B31ACB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1asp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A667AEC6-57E3-4D67-A02E-F0BAEBCE16DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1bsp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80EE163D-D9EC-46A1-826A-54F8F3A3FFBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1csp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CE4CFE4-C00F-4FAE-8FDF-F6C92E92838D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1gsp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE3170E3-0BCC-4C5F-8E6C-5E91E8C4E7A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1hsp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CCDB353-DD15-4C91-AD2A-73649C012E08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1isp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7DAAE1-BB3F-4FBA-A6ED-3BABC9196C1C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BEBCBF7-D1CF-488F-BB3E-F864F901A96A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.1sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06BBE88E-FEFB-4B90-91D1-4F053FA0EA47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.2asp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D43FA49-1F9D-4FD0-AF18-6E9AB6DF702F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD8CCA19-1D1C-45C0-A1A0-CED5885AD580\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.2sp:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"014224BF-926E-470C-A133-84036D8AD533\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77993343-0394-413F-ABF9-C1215E9AD800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.5b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0699DD6E-BA74-4814-93AB-300329C9D032\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2E2D781-2684-45F1-AC52-636572A0DCA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"479FB47B-AF2E-4FCB-8DE0-400BF325666C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF2B4C78-5C31-4F3D-9639-305E15576E79\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2C09F0A2-B21F-40ED-A6A8-9A29D6E1C6A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"32BA13F4-EF9C-4368-B8B1-9FD9FAF5CEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13CB889F-B064-4CAC-99AC-903745ACA566\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F11B703-8A0F-47ED-AA70-951FF78B94A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE7B2557-821D-4E05-B5C3-67192573D97D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E16D266-108F-4F8A-998D-F1CA25F2EAAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.9.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"41D55481-C80E-4400-9C3D-9F6B1F7F13CE\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/101042\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039454\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039455\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc\",\"source\":\"ykramarz@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/101042\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039454\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1039455\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cc\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.