CVE-2017-6664 (GCVE-0-2017-6664)
Vulnerability from cvelistv5 – Published: 2017-08-07 06:00 – Updated: 2024-08-05 15:33
VLAI?
Summary
A vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked. This vulnerability affected devices that are running Release 16.x of Cisco IOS XE Software and are configured to use Autonomic Networking. This vulnerability does not affect devices that are running an earlier release of Cisco IOS XE Software or devices that are not configured to use Autonomic Networking. More Information: CSCvd22328. Known Affected Releases: 15.5(1)S3.1 Denali-16.2.1.
Severity ?
No CVSS data available.
CWE
- Certificate Revocation Vulnerability
Assigner
References
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Cisco IOS XE |
Affected:
Cisco IOS XE
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:33:20.443Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "99986",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/99986"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl"
},
{
"name": "1038997",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038997"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Cisco IOS XE"
}
]
}
],
"datePublic": "2017-08-07T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked. This vulnerability affected devices that are running Release 16.x of Cisco IOS XE Software and are configured to use Autonomic Networking. This vulnerability does not affect devices that are running an earlier release of Cisco IOS XE Software or devices that are not configured to use Autonomic Networking. More Information: CSCvd22328. Known Affected Releases: 15.5(1)S3.1 Denali-16.2.1."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Certificate Revocation Vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-07T09:57:02",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "99986",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/99986"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl"
},
{
"name": "1038997",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1038997"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2017-6664",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS XE",
"version": {
"version_data": [
{
"version_value": "Cisco IOS XE"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked. This vulnerability affected devices that are running Release 16.x of Cisco IOS XE Software and are configured to use Autonomic Networking. This vulnerability does not affect devices that are running an earlier release of Cisco IOS XE Software or devices that are not configured to use Autonomic Networking. More Information: CSCvd22328. Known Affected Releases: 15.5(1)S3.1 Denali-16.2.1."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Certificate Revocation Vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "99986",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/99986"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl"
},
{
"name": "1038997",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1038997"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2017-6664",
"datePublished": "2017-08-07T06:00:00",
"dateReserved": "2017-03-09T00:00:00",
"dateUpdated": "2024-08-05T15:33:20.443Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8A4142E2-B8A8-4E78-B4ED-52F63C43C6F0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A7DA3731-E719-4DB7-9783-1C00481141EB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"278ACF0A-949B-486D-8F6C-ADC2AF25FC17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"37A30BA4-D760-4321-AAC8-04093AAAEA3E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"42616EA2-DDCF-4B57-BF2A-37968C82DDC6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C01C1D8-A191-45B7-A6C5-EE225F05A49E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E50FF89-8E71-4EA0-9AEC-2F800ED9D995\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7E70C455-E41C-4B17-847A-5F4281139252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"64A07329-3A7D-4483-AE69-4786FEB23D92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B9247665-BBE7-4DEF-B97B-4981A0EA5CE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E61E0102-B9B6-41F4-9041-0A5F144D849A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2A076E1F-3457-410A-8AB6-64416ECB20A7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAD93CD1-4188-40B7-A20E-9C3FE8344A27\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2972E680-5A19-4858-9B35-0B959ED319A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1BFE916-916F-4936-A331-21A0E8193920\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0EC9A19-26E6-4E69-B4E7-852CB6327EAD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A0E5BB91-B5E7-4961-87DC-26596E5EDED7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BA0B441A-3A09-4A58-8A40-D463003A50BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"970FD986-6D0E-441C-9BF3-C66A25763A7A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12793F39-13C4-4DBC-9B78-FE361BDDF89D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"876767C7-0196-4226-92B1-DDE851B53655\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE81AA43-88D4-4EFC-B8F6-A41EFF437819\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.5.1c:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"14B39732-D8FA-4E08-95FC-8F26C0BF8D0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F821EBD7-91E2-4460-BFAF-18482CF6CB8C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"A vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked. This vulnerability affected devices that are running Release 16.x of Cisco IOS XE Software and are configured to use Autonomic Networking. This vulnerability does not affect devices that are running an earlier release of Cisco IOS XE Software or devices that are not configured to use Autonomic Networking. More Information: CSCvd22328. Known Affected Releases: 15.5(1)S3.1 Denali-16.2.1.\"}, {\"lang\": \"es\", \"value\": \"Microsoft Edge en Microsoft Windows 10 1703 permite que un atacante ejecute c\\u00f3digo arbitrario en el contexto del usuario actual debido a la forma en la que los motores JavaScript del navegador de Microsoft renderizan contenido cuando gestionan objetos en la memoria. Esto tambi\\u00e9n se conoce como \\\"Scripting Engine Memory Corruption Vulnerability\\\". Este ID CVE es exclusivo de CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, y CVE-2017-8674.\"}]",
"id": "CVE-2017-6664",
"lastModified": "2024-11-21T03:30:15.293",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\", \"baseScore\": 7.5, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 3.6}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:N/I:P/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2017-08-07T06:29:00.263",
"references": "[{\"url\": \"http://www.securityfocus.com/bid/99986\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038997\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl\", \"source\": \"ykramarz@cisco.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/99986\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://www.securitytracker.com/id/1038997\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "ykramarz@cisco.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-295\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-6664\",\"sourceIdentifier\":\"psirt@cisco.com\",\"published\":\"2017-08-07T06:29:00.263\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked. This vulnerability affected devices that are running Release 16.x of Cisco IOS XE Software and are configured to use Autonomic Networking. This vulnerability does not affect devices that are running an earlier release of Cisco IOS XE Software or devices that are not configured to use Autonomic Networking. More Information: CSCvd22328. Known Affected Releases: 15.5(1)S3.1 Denali-16.2.1.\"},{\"lang\":\"es\",\"value\":\"Microsoft Edge en Microsoft Windows 10 1703 permite que un atacante ejecute c\u00f3digo arbitrario en el contexto del usuario actual debido a la forma en la que los motores JavaScript del navegador de Microsoft renderizan contenido cuando gestionan objetos en la memoria. Esto tambi\u00e9n se conoce como \\\"Scripting Engine Memory Corruption Vulnerability\\\". Este ID CVE es exclusivo de CVE-2017-8634, CVE-2017-8635, CVE-2017-8636, CVE-2017-8639, CVE-2017-8640, CVE-2017-8641, CVE-2017-8645, CVE-2017-8646, CVE-2017-8647, CVE-2017-8655, CVE-2017-8656, CVE-2017-8657, CVE-2017-8670, CVE-2017-8671, CVE-2017-8672, y CVE-2017-8674.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N\",\"baseScore\":7.5,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":3.9,\"impactScore\":3.6}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:N/I:P/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-295\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.8as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4142E2-B8A8-4E78-B4ED-52F63C43C6F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.10.8s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7DA3731-E719-4DB7-9783-1C00481141EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"503EFE9E-C238-46BA-8CA3-DE8D5DDB9A2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6EC8B17-6EC2-47AF-818D-1DFBDA612FB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"278ACF0A-949B-486D-8F6C-ADC2AF25FC17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"37A30BA4-D760-4321-AAC8-04093AAAEA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.12.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"42616EA2-DDCF-4B57-BF2A-37968C82DDC6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C01C1D8-A191-45B7-A6C5-EE225F05A49E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E50FF89-8E71-4EA0-9AEC-2F800ED9D995\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E70C455-E41C-4B17-847A-5F4281139252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.13.5s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"64A07329-3A7D-4483-AE69-4786FEB23D92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9247665-BBE7-4DEF-B97B-4981A0EA5CE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E61E0102-B9B6-41F4-9041-0A5F144D849A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A076E1F-3457-410A-8AB6-64416ECB20A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAD93CD1-4188-40B7-A20E-9C3FE8344A27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2972E680-5A19-4858-9B35-0B959ED319A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1BFE916-916F-4936-A331-21A0E8193920\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0EC9A19-26E6-4E69-B4E7-852CB6327EAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0E5BB91-B5E7-4961-87DC-26596E5EDED7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BA0B441A-3A09-4A58-8A40-D463003A50BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"970FD986-6D0E-441C-9BF3-C66A25763A7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12793F39-13C4-4DBC-9B78-FE361BDDF89D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"876767C7-0196-4226-92B1-DDE851B53655\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE81AA43-88D4-4EFC-B8F6-A41EFF437819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.5.1c:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B39732-D8FA-4E08-95FC-8F26C0BF8D0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:cisco:ios_xe:16.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F821EBD7-91E2-4460-BFAF-18482CF6CB8C\"}]}]}],\"references\":[{\"url\":\"http://www.securityfocus.com/bid/99986\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038997\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl\",\"source\":\"psirt@cisco.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/99986\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://www.securitytracker.com/id/1038997\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anicrl\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…