var-201707-0901
Vulnerability from variot
A vulnerability in the Border Gateway Protocol (BGP) processing functionality of the Cisco StarOS operating system for Cisco ASR 5000 Series Routers and Cisco Virtualized Packet Core (VPC) Software could allow an unauthenticated, remote attacker to cause the BGP process on an affected system to reload, resulting in a denial of service (DoS) condition. This vulnerability affects the following products if they are running the Cisco StarOS operating system and BGP is enabled for the system: Cisco ASR 5000 Series Routers and Cisco Virtualized Packet Core Software. More Information: CSCvc44968. Known Affected Releases: 16.4.1 19.1.0 21.1.0 21.1.M0.65824. Known Fixed Releases: 21.3.A0.65902 21.2.A0.65905 21.1.b0.66164 21.1.V0.66014 21.1.R0.65898 21.1.M0.65894 21.1.0.66030 21.1.0. Vendors have confirmed this vulnerability Bug ID CSCvc44968 It is released as.BGP Process reloaded, resulting in service disruption (DoS) There is a possibility of being put into a state. The Cisco ASR5000 Series is a carrier-grade platform for deploying high-demand 3G networks and migrating to Long Term Evolution (LTE). A security vulnerability exists in the Cisco ASR5000 Series Router. A remote attacker can cause a denial of service by sending a specific TCP packet to the StarOSBorderGatewayProtocol (BGP) service. An attacker can exploit this issue to cause a denial-of-service condition. This issue is being tracked by Cisco Bug ID CSCvc44968. StarOS is an operating system used in it
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201707-0901", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.3_base" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.1.0.59776" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "20.0.1.a0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.1_base" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "20.0.1.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.1.0.59780" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "19.6.3" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "19.6_base" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "18.3.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.6, "vendor": "cisco", "version": "20.0.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.2.12" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.1_base" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "17.3.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.0.m0.60737" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.0.2.3.65026" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "21.0_m0.64246" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.0.m0.61045" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "17.3.1" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.0.1.v0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.4.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.0.m0.60828" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "17.7.5" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.0.l0.59219" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.0.0.59211" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "17.3_base" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.0.v0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.2_base" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.1.0.61559" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.1.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.3.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.0.0.59167" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "17.2.0.59184" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.5.2" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.1.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "17.2.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.0.2.v1" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "17.7.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.0.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.0.m0.63229" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.1.v2" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.0.m0.62842" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "18.0.0.57828" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "21.0.v1" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "21.0.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.2.0" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "21.0_base" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "21.0_m0.64702" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.4.1" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "20.0.2.3" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "19.0.1" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "17.3.9.62033" }, { "model": "asr 5000 software", "scope": "eq", "trust": 1.0, "vendor": "cisco", "version": "16.5.0" }, { "model": "asr 5000 series software", "scope": null, "trust": 0.8, "vendor": "cisco", "version": null }, { "model": "asr series", "scope": "eq", "trust": 0.6, "vendor": "cisco", "version": "5000" }, { "model": "virtualized packet core software", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "staros", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "0" }, { "model": "asr series", "scope": "eq", "trust": 0.3, "vendor": "cisco", "version": "50000" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-22154" }, { "db": "BID", "id": "100015" }, { "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "db": "NVD", "id": "CVE-2017-6729" }, { "db": "CNNVD", "id": "CNNVD-201707-392" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "children": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:16.5.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:17.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:17.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:17.3.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:17.3.9.62033:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:17.3_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.4.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.0.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.0.m0.60737:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.0.m0.60828:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.2.3.65026:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.2.v1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.m0.62842:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.m0.63229:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.v0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:16.4.1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.0.0.59167:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.0.0.59211:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.0.l0.59219:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.1.0.59776:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.6.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.6_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:21.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:21.0.v1:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:21.0_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:21.0_m0.64246:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:17.7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.0.0.57828:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.1_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.3_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.0.m0.61045:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.1.0.61559:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.1.a0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.2.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.1_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.2_base:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:21.0_m0.64702:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:16.5.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:17.2.0.59184:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:17.7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.0.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.1.0.59780:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:18.3.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:19.2.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.1.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.0.1.v0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.1.v2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:a:cisco:asr_5000_software:20.2.12:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:h:cisco:asr_5000:-:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": false } ], "operator": "OR" } ], "cpe_match": [], "operator": "AND" } ] } ], "sources": [ { "db": "NVD", "id": "CVE-2017-6729" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco", "sources": [ { "db": "BID", "id": "100015" } ], "trust": 0.3 }, "cve": "CVE-2017-6729", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "acInsufInfo": false, "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "NVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "impactScore": 2.9, "integrityImpact": "NONE", "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "MEDIUM", "trust": 1.0, "userInteractionRequired": false, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "Low", "accessVector": "Network", "authentication": "None", "author": "NVD", "availabilityImpact": "Partial", "baseScore": 5.0, "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-6729", "impactScore": null, "integrityImpact": "None", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "severity": "Medium", "trust": 0.8, "userInteractionRequired": null, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "CNVD", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "CNVD-2017-22154", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.6, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "exploitabilityScore": 10.0, "id": "VHN-114932", "impactScore": 2.9, "integrityImpact": "NONE", "severity": "MEDIUM", "trust": 0.1, "vectorString": "AV:N/AC:L/AU:N/C:N/I:N/A:P", "version": "2.0" } ], "cvssV3": [ { "attackComplexity": "LOW", "attackVector": "NETWORK", "author": "NVD", "availabilityImpact": "HIGH", "baseScore": 7.5, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "exploitabilityScore": 3.9, "impactScore": 3.6, "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "trust": 1.0, "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" }, { "attackComplexity": "Low", "attackVector": "Network", "author": "NVD", "availabilityImpact": "High", "baseScore": 7.5, "baseSeverity": "High", "confidentialityImpact": "None", "exploitabilityScore": null, "id": "CVE-2017-6729", "impactScore": null, "integrityImpact": "None", "privilegesRequired": "None", "scope": "Unchanged", "trust": 0.8, "userInteraction": "None", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "version": "3.0" } ], "severity": [ { "author": "NVD", "id": "CVE-2017-6729", "trust": 1.8, "value": "HIGH" }, { "author": "CNVD", "id": "CNVD-2017-22154", "trust": 0.6, "value": "MEDIUM" }, { "author": "CNNVD", "id": "CNNVD-201707-392", "trust": 0.6, "value": "HIGH" }, { "author": "VULHUB", "id": "VHN-114932", "trust": 0.1, "value": "MEDIUM" } ] } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-22154" }, { "db": "VULHUB", "id": "VHN-114932" }, { "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "db": "NVD", "id": "CVE-2017-6729" }, { "db": "CNNVD", "id": "CNNVD-201707-392" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "A vulnerability in the Border Gateway Protocol (BGP) processing functionality of the Cisco StarOS operating system for Cisco ASR 5000 Series Routers and Cisco Virtualized Packet Core (VPC) Software could allow an unauthenticated, remote attacker to cause the BGP process on an affected system to reload, resulting in a denial of service (DoS) condition. This vulnerability affects the following products if they are running the Cisco StarOS operating system and BGP is enabled for the system: Cisco ASR 5000 Series Routers and Cisco Virtualized Packet Core Software. More Information: CSCvc44968. Known Affected Releases: 16.4.1 19.1.0 21.1.0 21.1.M0.65824. Known Fixed Releases: 21.3.A0.65902 21.2.A0.65905 21.1.b0.66164 21.1.V0.66014 21.1.R0.65898 21.1.M0.65894 21.1.0.66030 21.1.0. Vendors have confirmed this vulnerability Bug ID CSCvc44968 It is released as.BGP Process reloaded, resulting in service disruption (DoS) There is a possibility of being put into a state. The Cisco ASR5000 Series is a carrier-grade platform for deploying high-demand 3G networks and migrating to Long Term Evolution (LTE). A security vulnerability exists in the Cisco ASR5000 Series Router. A remote attacker can cause a denial of service by sending a specific TCP packet to the StarOSBorderGatewayProtocol (BGP) service. \nAn attacker can exploit this issue to cause a denial-of-service condition. \nThis issue is being tracked by Cisco Bug ID CSCvc44968. StarOS is an operating system used in it", "sources": [ { "db": "NVD", "id": "CVE-2017-6729" }, { "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "db": "CNVD", "id": "CNVD-2017-22154" }, { "db": "BID", "id": "100015" }, { "db": "VULHUB", "id": "VHN-114932" } ], "trust": 2.52 }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2017-6729", "trust": 3.4 }, { "db": "BID", "id": "100015", "trust": 2.6 }, { "db": "SECTRACK", "id": "1038819", "trust": 2.3 }, { "db": "JVNDB", "id": "JVNDB-2017-005624", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201707-392", "trust": 0.7 }, { "db": "CNVD", "id": "CNVD-2017-22154", "trust": 0.6 }, { "db": "VULHUB", "id": "VHN-114932", "trust": 0.1 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-22154" }, { "db": "VULHUB", "id": "VHN-114932" }, { "db": "BID", "id": "100015" }, { "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "db": "NVD", "id": "CVE-2017-6729" }, { "db": "CNNVD", "id": "CNNVD-201707-392" } ] }, "id": "VAR-201707-0901", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "CNVD", "id": "CNVD-2017-22154" }, { "db": "VULHUB", "id": "VHN-114932" } ], "trust": 1.24681986 }, "iot_taxonomy": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "category": [ "Network device" ], "sub_category": null, "trust": 0.6 } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-22154" } ] }, "last_update_date": "2023-12-18T12:57:19.122000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "cisco-sa-20170705-staros", "trust": 0.8, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170705-staros" }, { "title": "Patch for CiscoASR5500 SeriesRouters Denial of Service Vulnerability", "trust": 0.6, "url": "https://www.cnvd.org.cn/patchinfo/show/100513" }, { "title": "Cisco ASR 5000 Series Routers and Cisco Virtualized Packet Core Software Security vulnerabilities", "trust": 0.6, "url": "http://www.cnnvd.org.cn/web/xxk/bdxqbyid.tag?id=71590" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-22154" }, { "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "db": "CNNVD", "id": "CNNVD-201707-392" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "NVD-CWE-noinfo", "trust": 1.0 }, { "problemtype": "CWE-399", "trust": 0.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-114932" }, { "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "db": "NVD", "id": "CVE-2017-6729" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.0, "url": "https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170705-staros" }, { "trust": 1.7, "url": "http://www.securityfocus.com/bid/100015" }, { "trust": 1.7, "url": "http://www.securitytracker.com/id/1038819" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6729" }, { "trust": 0.8, "url": "https://nvd.nist.gov/vuln/detail/cve-2017-6729" }, { "trust": 0.6, "url": "http://securitytracker.com/id/1038819" }, { "trust": 0.3, "url": "http://www.cisco.com/" } ], "sources": [ { "db": "CNVD", "id": "CNVD-2017-22154" }, { "db": "VULHUB", "id": "VHN-114932" }, { "db": "BID", "id": "100015" }, { "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "db": "NVD", "id": "CVE-2017-6729" }, { "db": "CNNVD", "id": "CNNVD-201707-392" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CNVD", "id": "CNVD-2017-22154" }, { "db": "VULHUB", "id": "VHN-114932" }, { "db": "BID", "id": "100015" }, { "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "db": "NVD", "id": "CVE-2017-6729" }, { "db": "CNNVD", "id": "CNNVD-201707-392" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-21T00:00:00", "db": "CNVD", "id": "CNVD-2017-22154" }, { "date": "2017-07-10T00:00:00", "db": "VULHUB", "id": "VHN-114932" }, { "date": "2017-07-28T00:00:00", "db": "BID", "id": "100015" }, { "date": "2017-08-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "date": "2017-07-10T20:29:00.547000", "db": "NVD", "id": "CVE-2017-6729" }, { "date": "2017-07-11T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-392" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2017-08-21T00:00:00", "db": "CNVD", "id": "CNVD-2017-22154" }, { "date": "2019-10-03T00:00:00", "db": "VULHUB", "id": "VHN-114932" }, { "date": "2017-07-28T00:00:00", "db": "BID", "id": "100015" }, { "date": "2017-08-02T00:00:00", "db": "JVNDB", "id": "JVNDB-2017-005624" }, { "date": "2019-10-03T00:03:26.223000", "db": "NVD", "id": "CVE-2017-6729" }, { "date": "2019-10-23T00:00:00", "db": "CNNVD", "id": "CNNVD-201707-392" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201707-392" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Cisco ASR 5000 For series router Cisco StarOS and VPC Software BGP In processing functions BGP Process reload vulnerability", "sources": [ { "db": "JVNDB", "id": "JVNDB-2017-005624" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "resource management error", "sources": [ { "db": "CNNVD", "id": "CNNVD-201707-392" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.