Action not permitted
Modal body text goes here.
wid-sec-w-2023-0999
Vulnerability from csaf_certbund
Published
2017-06-29 22:00
Modified
2023-04-18 22:00
Summary
Cisco IOS: Mehrere Schwachstellen
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung
Cisco Internetwork Operating System (IOS) ist ein Betriebssystem, das für Cisco Geräte wie z. B. Router und Switches eingesetzt wird.
Angriff
Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Cisco IOS und Cisco IOS XE ausnutzen, um beliebigen Programmcode auszuführen oder einen Denial of Service Angriff durchzuführen.
Betroffene Betriebssysteme
- BIOS/Firmware
{ "document": { "aggregate_severity": { "text": "hoch" }, "category": "csaf_base", "csaf_version": "2.0", "distribution": { "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "de-DE", "notes": [ { "category": "legal_disclaimer", "text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen." }, { "category": "description", "text": "Cisco Internetwork Operating System (IOS) ist ein Betriebssystem, das f\u00fcr Cisco Ger\u00e4te wie z. B. Router und Switches eingesetzt wird.", "title": "Produktbeschreibung" }, { "category": "summary", "text": "Ein entfernter, authentisierter Angreifer kann mehrere Schwachstellen in Cisco IOS und Cisco IOS XE ausnutzen, um beliebigen Programmcode auszuf\u00fchren oder einen Denial of Service Angriff durchzuf\u00fchren.", "title": "Angriff" }, { "category": "general", "text": "- BIOS/Firmware", "title": "Betroffene Betriebssysteme" } ], "publisher": { "category": "other", "contact_details": "csaf-provider@cert-bund.de", "name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik", "namespace": "https://www.bsi.bund.de" }, "references": [ { "category": "self", "summary": "WID-SEC-W-2023-0999 - CSAF Version", "url": "https://wid.cert-bund.de/.well-known/csaf/white/2017/wid-sec-w-2023-0999.json" }, { "category": "self", "summary": "WID-SEC-2023-0999 - Portal Version", "url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2023-0999" }, { "category": "external", "summary": "NCSC Warning vom 2023-04-18", "url": "https://www.ncsc.gov.uk/news/apt28-exploits-known-vulnerability-to-carry-out-reconnaissance-and-deploy-malware-on-cisco-routers" }, { "category": "external", "summary": "Cisco Security Advisory #cisco-sa-20170629-snmp vom 2017-06-29", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" }, { "category": "external", "summary": "Meldung 43450 auf der Exploit-DB vom 2018-01-07", "url": "https://www.exploit-db.com/exploits/43450/" }, { "category": "external", "summary": "Update des Cisco Security Advisory cisco-sa-20170629-snmp vom 2018-01-11", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "source_lang": "en-US", "title": "Cisco IOS: Mehrere Schwachstellen", "tracking": { "current_release_date": "2023-04-18T22:00:00.000+00:00", "generator": { "date": "2024-02-15T17:24:17.031+00:00", "engine": { "name": "BSI-WID", "version": "1.3.0" } }, "id": "WID-SEC-W-2023-0999", "initial_release_date": "2017-06-29T22:00:00.000+00:00", "revision_history": [ { "date": "2017-06-29T22:00:00.000+00:00", "number": "1", "summary": "Initial Release" }, { "date": "2017-07-23T22:00:00.000+00:00", "number": "2", "summary": "reference added" }, { "date": "2017-09-04T22:00:00.000+00:00", "number": "3", "summary": "Admin" }, { "date": "2017-09-04T22:00:00.000+00:00", "number": "4", "summary": "Admin" }, { "date": "2017-09-05T22:00:00.000+00:00", "number": "5", "summary": "Auswirkung auf Admin gesetzt" }, { "date": "2017-09-05T22:00:00.000+00:00", "number": "6", "summary": "Version nicht vorhanden" }, { "date": "2018-01-07T23:00:00.000+00:00", "number": "7", "summary": "poc added" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "8", "summary": "update of cisco advisory" }, { "date": "2018-01-11T23:00:00.000+00:00", "number": "9", "summary": "Version nicht vorhanden" }, { "date": "2023-04-18T22:00:00.000+00:00", "number": "10", "summary": "CVE-2017-6742 wird durch \"APT28\" ausgenutzt" } ], "status": "final", "version": "10" } }, "product_tree": { "branches": [ { "branches": [ { "category": "product_name", "name": "Cisco IOS", "product": { "name": "Cisco IOS", "product_id": "T008395", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios:-" } } }, { "category": "product_name", "name": "Cisco IOS XE", "product": { "name": "Cisco IOS XE", "product_id": "T001605", "product_identification_helper": { "cpe": "cpe:/o:cisco:ios_xe:-" } } } ], "category": "vendor", "name": "Cisco" } ] }, "vulnerabilities": [ { "cve": "CVE-2017-6736", "notes": [ { "category": "description", "text": "In Cisco IOS und Cisco IOS XE existieren mehrere Schwachstellen im Zusammenhang mit dem Simple Network Management Protocol (SNMP). Diese Schwachstellen basieren auf einem Buffer Overflow Fehler im SNMP Subsystem.Ein entfernter authentisierter Angreifer kann diese Schwachstellen durch das Senden einer entsprechend bearbeiteten SNMP Anfrage an ein betroffenes System ausnutzen, um beliebigen Code auszuf\u00fchren und volle Kontrolle \u00fcber das System zu erlangen oder um ein Neustart des Ger\u00e4ts zu verursachen." } ], "product_status": { "known_affected": [ "T001605", "T008395" ] }, "release_date": "2017-06-29T22:00:00Z", "title": "CVE-2017-6736" }, { "cve": "CVE-2017-6737", "notes": [ { "category": "description", "text": "In Cisco IOS und Cisco IOS XE existieren mehrere Schwachstellen im Zusammenhang mit dem Simple Network Management Protocol (SNMP). Diese Schwachstellen basieren auf einem Buffer Overflow Fehler im SNMP Subsystem.Ein entfernter authentisierter Angreifer kann diese Schwachstellen durch das Senden einer entsprechend bearbeiteten SNMP Anfrage an ein betroffenes System ausnutzen, um beliebigen Code auszuf\u00fchren und volle Kontrolle \u00fcber das System zu erlangen oder um ein Neustart des Ger\u00e4ts zu verursachen." } ], "product_status": { "known_affected": [ "T001605", "T008395" ] }, "release_date": "2017-06-29T22:00:00Z", "title": "CVE-2017-6737" }, { "cve": "CVE-2017-6738", "notes": [ { "category": "description", "text": "In Cisco IOS und Cisco IOS XE existieren mehrere Schwachstellen im Zusammenhang mit dem Simple Network Management Protocol (SNMP). Diese Schwachstellen basieren auf einem Buffer Overflow Fehler im SNMP Subsystem.Ein entfernter authentisierter Angreifer kann diese Schwachstellen durch das Senden einer entsprechend bearbeiteten SNMP Anfrage an ein betroffenes System ausnutzen, um beliebigen Code auszuf\u00fchren und volle Kontrolle \u00fcber das System zu erlangen oder um ein Neustart des Ger\u00e4ts zu verursachen." } ], "product_status": { "known_affected": [ "T001605", "T008395" ] }, "release_date": "2017-06-29T22:00:00Z", "title": "CVE-2017-6738" }, { "cve": "CVE-2017-6739", "notes": [ { "category": "description", "text": "In Cisco IOS und Cisco IOS XE existieren mehrere Schwachstellen im Zusammenhang mit dem Simple Network Management Protocol (SNMP). Diese Schwachstellen basieren auf einem Buffer Overflow Fehler im SNMP Subsystem.Ein entfernter authentisierter Angreifer kann diese Schwachstellen durch das Senden einer entsprechend bearbeiteten SNMP Anfrage an ein betroffenes System ausnutzen, um beliebigen Code auszuf\u00fchren und volle Kontrolle \u00fcber das System zu erlangen oder um ein Neustart des Ger\u00e4ts zu verursachen." } ], "product_status": { "known_affected": [ "T001605", "T008395" ] }, "release_date": "2017-06-29T22:00:00Z", "title": "CVE-2017-6739" }, { "cve": "CVE-2017-6740", "notes": [ { "category": "description", "text": "In Cisco IOS und Cisco IOS XE existieren mehrere Schwachstellen im Zusammenhang mit dem Simple Network Management Protocol (SNMP). Diese Schwachstellen basieren auf einem Buffer Overflow Fehler im SNMP Subsystem.Ein entfernter authentisierter Angreifer kann diese Schwachstellen durch das Senden einer entsprechend bearbeiteten SNMP Anfrage an ein betroffenes System ausnutzen, um beliebigen Code auszuf\u00fchren und volle Kontrolle \u00fcber das System zu erlangen oder um ein Neustart des Ger\u00e4ts zu verursachen." } ], "product_status": { "known_affected": [ "T001605", "T008395" ] }, "release_date": "2017-06-29T22:00:00Z", "title": "CVE-2017-6740" }, { "cve": "CVE-2017-6741", "notes": [ { "category": "description", "text": "In Cisco IOS und Cisco IOS XE existieren mehrere Schwachstellen im Zusammenhang mit dem Simple Network Management Protocol (SNMP). Diese Schwachstellen basieren auf einem Buffer Overflow Fehler im SNMP Subsystem.Ein entfernter authentisierter Angreifer kann diese Schwachstellen durch das Senden einer entsprechend bearbeiteten SNMP Anfrage an ein betroffenes System ausnutzen, um beliebigen Code auszuf\u00fchren und volle Kontrolle \u00fcber das System zu erlangen oder um ein Neustart des Ger\u00e4ts zu verursachen." } ], "product_status": { "known_affected": [ "T001605", "T008395" ] }, "release_date": "2017-06-29T22:00:00Z", "title": "CVE-2017-6741" }, { "cve": "CVE-2017-6742", "notes": [ { "category": "description", "text": "In Cisco IOS und Cisco IOS XE existieren mehrere Schwachstellen im Zusammenhang mit dem Simple Network Management Protocol (SNMP). Diese Schwachstellen basieren auf einem Buffer Overflow Fehler im SNMP Subsystem.Ein entfernter authentisierter Angreifer kann diese Schwachstellen durch das Senden einer entsprechend bearbeiteten SNMP Anfrage an ein betroffenes System ausnutzen, um beliebigen Code auszuf\u00fchren und volle Kontrolle \u00fcber das System zu erlangen oder um ein Neustart des Ger\u00e4ts zu verursachen." } ], "product_status": { "known_affected": [ "T001605", "T008395" ] }, "release_date": "2017-06-29T22:00:00Z", "title": "CVE-2017-6742" }, { "cve": "CVE-2017-6743", "notes": [ { "category": "description", "text": "In Cisco IOS und Cisco IOS XE existieren mehrere Schwachstellen im Zusammenhang mit dem Simple Network Management Protocol (SNMP). Diese Schwachstellen basieren auf einem Buffer Overflow Fehler im SNMP Subsystem.Ein entfernter authentisierter Angreifer kann diese Schwachstellen durch das Senden einer entsprechend bearbeiteten SNMP Anfrage an ein betroffenes System ausnutzen, um beliebigen Code auszuf\u00fchren und volle Kontrolle \u00fcber das System zu erlangen oder um ein Neustart des Ger\u00e4ts zu verursachen." } ], "product_status": { "known_affected": [ "T001605", "T008395" ] }, "release_date": "2017-06-29T22:00:00Z", "title": "CVE-2017-6743" }, { "cve": "CVE-2017-6744", "notes": [ { "category": "description", "text": "In Cisco IOS und Cisco IOS XE existieren mehrere Schwachstellen im Zusammenhang mit dem Simple Network Management Protocol (SNMP). Diese Schwachstellen basieren auf einem Buffer Overflow Fehler im SNMP Subsystem.Ein entfernter authentisierter Angreifer kann diese Schwachstellen durch das Senden einer entsprechend bearbeiteten SNMP Anfrage an ein betroffenes System ausnutzen, um beliebigen Code auszuf\u00fchren und volle Kontrolle \u00fcber das System zu erlangen oder um ein Neustart des Ger\u00e4ts zu verursachen." } ], "product_status": { "known_affected": [ "T001605", "T008395" ] }, "release_date": "2017-06-29T22:00:00Z", "title": "CVE-2017-6744" } ] }
cve-2017-6737
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2024-11-15 17:59
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60402.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99345 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038808 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | Cisco IOS and IOS XE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.087Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-6737", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:36:41.695392Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-6737" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:59:41.044Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60402." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-18T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6737", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60402." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "99345", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038808" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6737", "datePublished": "2017-07-17T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-11-15T17:59:41.044Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6744
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.
The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.
There are workarounds that address these vulnerabilities.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | IOS | |
IntelliShield | Universal Product |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.197Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "cisco-sa-20170629-snmp", "tags": [ "x_transferred" ], "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1(3)XI" }, { "status": "affected", "version": "12.2(1b)DA" }, { "status": "affected", "version": "12.2(5)DA" }, { "status": "affected", "version": "12.2(7)DA" }, { "status": "affected", "version": "12.2(12)DA" }, { "status": "affected", "version": "12.2(10)DA5" }, { "status": "affected", "version": "12.2(12)DA10" }, { "status": "affected", "version": "12.2(10)DA" }, { "status": "affected", "version": "12.2(12)DA1" }, { "status": "affected", "version": "12.2(12)DA6" }, { "status": "affected", "version": "12.2(10)DA8" }, { "status": "affected", "version": "12.2(12)DA8" }, { "status": "affected", "version": "12.2(12)DA11" }, { "status": "affected", "version": "12.2(12)DA9" }, { "status": "affected", "version": "12.2(12)DA4" }, { "status": "affected", "version": "12.2(10)DA3" }, { "status": "affected", "version": "12.2(5)DA1" }, { "status": "affected", "version": "12.2(12)DA13" }, { "status": "affected", "version": "12.2(12)DA12" }, { "status": "affected", "version": "12.2(12)DA7" }, { "status": "affected", "version": "12.2(1b)DA1" }, { "status": "affected", "version": "12.2(10)DA1" }, { "status": "affected", "version": "12.2(10)DA6" }, { "status": "affected", "version": "12.2(10)DA4" }, { "status": "affected", "version": "12.2(12)DA2" }, { "status": "affected", "version": "12.2(12)DA3" }, { "status": "affected", "version": "12.2(10)DA2" }, { "status": "affected", "version": "12.2(12)DA5" }, { "status": "affected", "version": "12.2(10)DA7" }, { "status": "affected", "version": "12.2(10)DA9" }, { "status": "affected", "version": "12.2(22)S" }, { "status": "affected", "version": "12.2(20)S" }, { "status": "affected", "version": "12.2(18)S" }, { "status": "affected", "version": "12.2(25)S" }, { "status": "affected", "version": "12.2(20)S5" }, { "status": "affected", "version": "12.2(18)S1" }, { "status": "affected", "version": "12.2(20)S4" }, { "status": "affected", "version": "12.2(18)S2" }, { "status": "affected", "version": "12.2(18)S4" }, { "status": "affected", "version": "12.2(25)S2" }, { "status": "affected", "version": "12.2(20)S2" }, { "status": "affected", "version": "12.2(18)S3" }, { "status": "affected", "version": "12.2(20)S6" }, { "status": "affected", "version": "12.2(20)S3" }, { "status": "affected", "version": "12.2(25)S1" }, { "status": "affected", "version": "12.2(20)S1" }, { "status": "affected", "version": "12.2(10a)" }, { "status": "affected", "version": "12.2(1)" }, { "status": "affected", "version": "12.2(21b)" }, { "status": "affected", "version": "12.2(10)" }, { "status": "affected", "version": "12.2(1a)" }, { "status": "affected", "version": "12.2(1b)" }, { "status": "affected", "version": "12.2(1d)" }, { "status": "affected", "version": "12.2(10b)" }, { "status": "affected", "version": "12.2(10d)" }, { "status": "affected", "version": "12.2(10g)" }, { "status": "affected", "version": "12.2(3d)" }, { "status": "affected", "version": "12.2(3g)" }, { "status": "affected", "version": "12.2(3)" }, { "status": "affected", "version": "12.2(5)" }, { "status": "affected", "version": "12.2(5a)" }, { "status": "affected", "version": "12.2(5d)" }, { "status": "affected", "version": "12.2(6g)" }, { "status": "affected", "version": "12.2(6h)" }, { "status": "affected", "version": "12.2(6i)" }, { "status": "affected", "version": "12.2(6j)" }, { "status": "affected", "version": "12.2(6)" }, { "status": "affected", "version": "12.2(6a)" }, { "status": "affected", "version": "12.2(6b)" }, { "status": "affected", "version": "12.2(6c)" }, { "status": "affected", "version": "12.2(6d)" }, { "status": "affected", "version": "12.2(6e)" }, { "status": "affected", "version": "12.2(6f)" }, { "status": "affected", "version": "12.2(7a)" }, { "status": "affected", "version": "12.2(7b)" }, { "status": "affected", "version": "12.2(7c)" }, { "status": "affected", "version": "12.2(7g)" }, { "status": "affected", "version": "12.2(7)" }, { "status": "affected", "version": "12.2(37)" }, { "status": "affected", "version": "12.2(19b)" }, { "status": "affected", "version": "12.2(24b)" }, { "status": "affected", "version": "12.2(12e)" }, { "status": "affected", "version": "12.2(28)" }, { "status": "affected", "version": "12.2(12b)" }, { "status": "affected", "version": "12.2(26b)" }, { "status": "affected", "version": "12.2(28a)" }, { "status": "affected", "version": "12.2(12i)" }, { "status": "affected", "version": "12.2(19)" }, { "status": "affected", "version": "12.2(24)" }, { "status": "affected", "version": "12.2(12g)" }, { "status": "affected", "version": "12.2(13c)" }, { "status": "affected", "version": "12.2(12f)" }, { "status": "affected", "version": "12.2(12c)" }, { "status": "affected", "version": "12.2(32)" }, { "status": "affected", "version": "12.2(31)" }, { "status": "affected", "version": "12.2(26a)" }, { "status": "affected", "version": "12.2(27)" }, { "status": "affected", "version": "12.2(17e)" }, { "status": "affected", "version": "12.2(28d)" }, { "status": "affected", "version": "12.2(17a)" }, { "status": "affected", "version": "12.2(12k)" }, { "status": "affected", "version": "12.2(13e)" }, { "status": "affected", "version": "12.2(12a)" }, { "status": "affected", "version": "12.2(19c)" }, { "status": "affected", "version": "12.2(27b)" }, { "status": "affected", "version": "12.2(17b)" }, { "status": "affected", "version": "12.2(23)" }, { "status": "affected", "version": "12.2(27a)" }, { "status": "affected", "version": "12.2(16)" }, { "status": "affected", "version": "12.2(12m)" }, { "status": "affected", "version": "12.2(40)" }, { "status": "affected", "version": "12.2(28c)" }, { "status": "affected", "version": "12.2(24a)" }, { "status": "affected", "version": "12.2(21a)" }, { "status": "affected", "version": "12.2(13b)" }, { "status": "affected", "version": "12.2(23a)" }, { "status": "affected", "version": "12.2(17d)" }, { "status": "affected", "version": "12.2(26)" }, { "status": "affected", "version": "12.2(23c)" }, { "status": "affected", "version": "12.2(16b)" }, { "status": "affected", "version": "12.2(13)" }, { "status": "affected", "version": "12.2(19a)" }, { "status": "affected", "version": "12.2(17f)" }, { "status": "affected", "version": "12.2(28b)" }, { "status": "affected", "version": "12.2(23d)" }, { "status": "affected", "version": "12.2(12)" }, { "status": "affected", "version": "12.2(12j)" }, { "status": "affected", "version": "12.2(23f)" }, { "status": "affected", "version": "12.2(17)" }, { "status": "affected", "version": "12.2(16c)" }, { "status": "affected", "version": "12.2(16a)" }, { "status": "affected", "version": "12.2(12l)" }, { "status": "affected", "version": "12.2(12h)" }, { "status": "affected", "version": "12.2(16f)" }, { "status": "affected", "version": "12.2(29a)" }, { "status": "affected", "version": "12.2(13a)" }, { "status": "affected", "version": "12.2(40a)" }, { "status": "affected", "version": "12.2(23e)" }, { "status": "affected", "version": "12.2(21)" }, { "status": "affected", "version": "12.2(46)" }, { "status": "affected", "version": "12.2(29)" }, { "status": "affected", "version": "12.2(4)YA" }, { "status": "affected", "version": "12.2(4)YA6" }, { "status": "affected", "version": "12.2(4)YA3" }, { "status": "affected", "version": "12.2(4)YA4" }, { "status": "affected", "version": "12.2(4)YA1" }, { "status": "affected", "version": "12.2(4)YA11" }, { "status": "affected", "version": "12.2(4)YA2" }, { "status": "affected", "version": "12.2(4)YA9" }, { "status": "affected", "version": "12.2(4)YA8" }, { "status": "affected", "version": "12.2(4)YA5" }, { "status": "affected", "version": "12.2(4)YA12" }, { "status": "affected", "version": "12.2(4)YA10" }, { "status": "affected", "version": "12.2(4)YA7" }, { "status": "affected", "version": "12.2(4)YG" }, { "status": "affected", "version": "12.2(14)SZ" }, { "status": "affected", "version": "12.2(14)SZ5" }, { "status": "affected", "version": "12.2(14)SZ6" }, { "status": "affected", "version": "12.2(14)SZ3" }, { "status": "affected", "version": "12.2(14)SZ4" }, { "status": "affected", "version": "12.2(14)SZ1" }, { "status": "affected", "version": "12.2(14)SZ2" }, { "status": "affected", "version": "12.2(8)YJ" }, { "status": "affected", "version": "12.2(8)YJ1" }, { "status": "affected", "version": "12.2(8)YN" }, { "status": "affected", "version": "12.2(9)YO" }, { "status": "affected", "version": "12.2(9)YO3" }, { "status": "affected", "version": "12.2(9)YO2" }, { "status": "affected", "version": "12.2(9)YO1" }, { "status": "affected", "version": "12.2(9)YO4" }, { "status": "affected", "version": "12.2(8)YM" }, { "status": "affected", "version": "12.2(11)YU" }, { "status": "affected", "version": "12.2(11)YV" }, { "status": "affected", "version": "12.2(11)YV1" }, { "status": "affected", "version": "12.2(11)YZ" }, { "status": "affected", "version": "12.2(11)YZ1" }, { "status": "affected", "version": "12.2(11)YZ2" }, { "status": "affected", "version": "12.2(8)ZB" }, { "status": "affected", "version": "12.2(13)ZG" }, { "status": "affected", "version": "12.2(13)ZH" }, { "status": "affected", "version": "12.2(13)ZH9" }, { "status": "affected", "version": "12.2(13)ZH2" }, { "status": "affected", "version": "12.2(13)ZH8" }, { "status": "affected", "version": "12.2(13)ZH10" }, { "status": "affected", "version": "12.2(13)ZH4" }, { "status": "affected", "version": "12.2(13)ZH3" }, { "status": "affected", "version": "12.2(13)ZH7" }, { "status": "affected", "version": "12.2(13)ZH6" }, { "status": "affected", "version": "12.3(9a)" }, { "status": "affected", "version": "12.3(15)" }, { "status": "affected", "version": "12.3(19)" }, { "status": "affected", "version": "12.3(10f)" }, { "status": "affected", "version": "12.3(10a)" }, { "status": "affected", "version": "12.3(1)" }, { "status": "affected", "version": "12.3(1a)" }, { "status": "affected", "version": "12.3(10)" }, { "status": "affected", "version": "12.3(10b)" }, { "status": "affected", "version": "12.3(10c)" }, { "status": "affected", "version": "12.3(10d)" }, { "status": "affected", "version": "12.3(10e)" }, { "status": "affected", "version": "12.3(12b)" }, { "status": "affected", "version": "12.3(12a)" }, { "status": "affected", "version": "12.3(12c)" }, { "status": "affected", "version": "12.3(12d)" }, { "status": "affected", "version": "12.3(12e)" }, { "status": "affected", "version": "12.3(12)" }, { "status": "affected", "version": "12.3(13)" }, { "status": "affected", "version": "12.3(13a)" }, { "status": "affected", "version": "12.3(13b)" }, { "status": "affected", "version": "12.3(15a)" }, { "status": "affected", "version": "12.3(16)" }, { "status": "affected", "version": "12.3(17)" }, { "status": "affected", "version": "12.3(17a)" }, { "status": "affected", "version": "12.3(17b)" }, { "status": "affected", "version": "12.3(18)" }, { "status": "affected", "version": "12.3(20)" }, { "status": "affected", "version": "12.3(3f)" }, { "status": "affected", "version": "12.3(3e)" }, { "status": "affected", "version": "12.3(3g)" }, { "status": "affected", "version": "12.3(3c)" }, { "status": "affected", "version": "12.3(3b)" }, { "status": "affected", "version": "12.3(3a)" }, { "status": "affected", "version": "12.3(3)" }, { "status": "affected", "version": "12.3(3i)" }, { "status": "affected", "version": "12.3(3h)" }, { "status": "affected", "version": "12.3(5c)" }, { "status": "affected", "version": "12.3(5b)" }, { "status": "affected", "version": "12.3(5a)" }, { "status": "affected", "version": "12.3(5)" }, { "status": "affected", "version": "12.3(5f)" }, { "status": "affected", "version": "12.3(5e)" }, { "status": "affected", "version": "12.3(5d)" }, { "status": "affected", "version": "12.3(6f)" }, { "status": "affected", "version": "12.3(6e)" }, { "status": "affected", "version": "12.3(6c)" }, { "status": "affected", "version": "12.3(6b)" }, { "status": "affected", "version": "12.3(6a)" }, { "status": "affected", "version": "12.3(6)" }, { "status": "affected", "version": "12.3(9d)" }, { "status": "affected", "version": "12.3(9e)" }, { "status": "affected", "version": "12.3(9)" }, { "status": "affected", "version": "12.3(9b)" }, { "status": "affected", "version": "12.3(9c)" }, { "status": "affected", "version": "12.3(16a)" }, { "status": "affected", "version": "12.3(15b)" }, { "status": "affected", "version": "12.3(21)" }, { "status": "affected", "version": "12.3(22)" }, { "status": "affected", "version": "12.3(21b)" }, { "status": "affected", "version": "12.3(23)" }, { "status": "affected", "version": "12.3(26)" }, { "status": "affected", "version": "12.3(20a)" }, { "status": "affected", "version": "12.3(22a)" }, { "status": "affected", "version": "12.3(25)" }, { "status": "affected", "version": "12.3(17c)" }, { "status": "affected", "version": "12.3(24)" }, { "status": "affected", "version": "12.3(19a)" }, { "status": "affected", "version": "12.3(24a)" }, { "status": "affected", "version": "12.3(18a)" }, { "status": "affected", "version": "12.3(11)T" }, { "status": "affected", "version": "12.3(7)T12" }, { "status": "affected", "version": "12.3(11)T11" }, { "status": "affected", "version": "12.3(11)T10" }, { "status": "affected", "version": "12.3(14)T7" }, { "status": "affected", "version": "12.3(14)T" }, { "status": "affected", "version": "12.3(8)T" }, { "status": "affected", "version": "12.3(2)T" }, { "status": "affected", "version": "12.3(4)T" }, { "status": "affected", "version": "12.3(7)T" }, { "status": "affected", "version": "12.3(8)T9" }, { "status": "affected", "version": "12.3(2)T9" }, { "status": "affected", "version": "12.3(8)T6" }, { "status": "affected", "version": "12.3(4)T9" }, { "status": "affected", "version": "12.3(4)T4" }, { "status": "affected", "version": "12.3(2)T1" }, { "status": "affected", "version": "12.3(11)T5" }, { "status": "affected", "version": "12.3(7)T3" }, { "status": "affected", "version": "12.3(2)T2" }, { "status": "affected", "version": "12.3(8)T3" }, { "status": "affected", "version": "12.3(4)T7" }, { "status": "affected", "version": "12.3(8)T7" }, { "status": "affected", "version": "12.3(11)T8" }, { "status": "affected", "version": "12.3(7)T2" }, { "status": "affected", "version": "12.3(8)T4" }, { "status": "affected", "version": "12.3(8)T8" }, { "status": "affected", "version": "12.3(14)T5" }, { "status": "affected", "version": "12.3(11)T3" }, { "status": "affected", "version": "12.3(4)T10" }, { "status": "affected", "version": "12.3(2)T4" }, { "status": "affected", "version": "12.3(8)T10" }, { "status": "affected", "version": "12.3(14)T2" }, { "status": "affected", "version": "12.3(4)T2" }, { "status": "affected", "version": "12.3(7)T7" }, { "status": "affected", "version": "12.3(7)T10" }, { "status": "affected", "version": "12.3(7)T4" }, { "status": "affected", "version": "12.3(11)T6" }, { "status": "affected", "version": "12.3(7)T11" }, { "status": "affected", "version": "12.3(4)T6" }, { "status": "affected", "version": "12.3(2)T3" }, { "status": "affected", "version": "12.3(2)T5" }, { "status": "affected", "version": "12.3(2)T6" }, { "status": "affected", "version": "12.3(4)T3" }, { "status": "affected", "version": "12.3(14)T3" }, { "status": "affected", "version": "12.3(2)T8" }, { "status": "affected", "version": "12.3(11)T4" }, { "status": "affected", "version": "12.3(7)T9" }, { "status": "affected", "version": "12.3(8)T11" }, { "status": "affected", "version": "12.3(11)T9" }, { "status": "affected", "version": "12.3(7)T8" }, { "status": "affected", "version": "12.3(4)T1" }, { "status": "affected", "version": "12.3(8)T5" }, { "status": "affected", "version": "12.3(4)T11" }, { "status": "affected", "version": "12.3(4)T8" }, { "status": "affected", "version": "12.3(14)T1" }, { "status": "affected", "version": "12.3(11)T2" }, { "status": "affected", "version": "12.3(7)T6" }, { "status": "affected", "version": "12.3(2)T7" }, { "status": "affected", "version": "12.3(11)T7" }, { "status": "affected", "version": "12.3(7)T1" }, { "status": "affected", "version": "12.3(14)T6" }, { "status": "affected", "version": "12.3(8)T1" }, { "status": "affected", "version": "12.3(2)XA" }, { "status": "affected", "version": "12.3(2)XA4" }, { "status": "affected", "version": "12.3(2)XA7" }, { "status": "affected", "version": "12.3(2)XA3" }, { "status": "affected", "version": "12.3(2)XA6" }, { "status": "affected", "version": "12.3(2)XA5" }, { "status": "affected", "version": "12.3(4)XQ" }, { "status": "affected", "version": "12.3(4)XQ1" }, { "status": "affected", "version": "12.3(11)XL" }, { "status": "affected", "version": "12.3(11)XL1" }, { "status": "affected", "version": "12.3(4)XK3" }, { "status": "affected", "version": "12.3(4)XK1" }, { "status": "affected", "version": "12.3(4)XK4" }, { "status": "affected", "version": "12.3(4)XK" }, { "status": "affected", "version": "12.3(4)XK2" }, { "status": "affected", "version": "12.3(4)XG" }, { "status": "affected", "version": "12.3(4)XG3" }, { "status": "affected", "version": "12.3(4)XG1" }, { "status": "affected", "version": "12.3(4)XG4" }, { "status": "affected", "version": "12.3(4)XG2" }, { "status": "affected", "version": "12.3(4)XG5" }, { "status": "affected", "version": "12.3(2)XF" }, { "status": "affected", "version": "12.3(2)XE" }, { "status": "affected", "version": "12.3(2)XE5" }, { "status": "affected", "version": "12.3(2)XE2" }, { "status": "affected", "version": "12.3(2)XE1" }, { "status": "affected", "version": "12.3(2)XE4" }, { "status": "affected", "version": "12.3(2)XE3" }, { "status": "affected", "version": "12.3(4)XD" }, { "status": "affected", "version": "12.3(4)XD4" }, { "status": "affected", "version": "12.3(4)XD1" }, { "status": "affected", "version": "12.3(4)XD3" }, { "status": "affected", "version": "12.3(4)XD2" }, { "status": "affected", "version": "12.3(2)XC" }, { "status": "affected", "version": "12.3(2)XC2" }, { "status": "affected", "version": "12.3(2)XC1" }, { "status": "affected", "version": "12.2(25)SE" }, { "status": "affected", "version": "12.3(7)XR" }, { "status": "affected", "version": "12.3(7)XR4" }, { "status": "affected", "version": "12.3(7)XR3" }, { "status": "affected", "version": "12.3(7)XR5" }, { "status": "affected", "version": "12.3(7)XR6" }, { "status": "affected", "version": "12.3(7)XR2" }, { "status": "affected", "version": "12.3(7)XR7" }, { "status": "affected", "version": "12.3(8)XX" }, { "status": "affected", "version": "12.3(8)XX1" }, { "status": "affected", "version": "12.3(8)XX2d" }, { "status": "affected", "version": "12.3(8)YA" }, { "status": "affected", "version": "12.3(8)YA1" }, { "status": "affected", "version": "12.3(11)YF2" }, { "status": "affected", "version": "12.3(8)YG" }, { "status": "affected", "version": "12.3(8)YG5" }, { "status": "affected", "version": "12.3(8)YG3" }, { "status": "affected", "version": "12.3(8)YG6" }, { "status": "affected", "version": "12.3(8)YG2" }, { "status": "affected", "version": "12.3(8)YG1" }, { "status": "affected", "version": "12.3(8)YG4" }, { "status": "affected", "version": "12.2(12b)M1" }, { "status": "affected", "version": "12.2(12h)M1" }, { "status": "affected", "version": "12.3(8)YI2" }, { "status": "affected", "version": "12.3(8)YI3" }, { "status": "affected", "version": "12.3(8)YI1" }, { "status": "affected", "version": "12.3(11)YK" }, { "status": "affected", "version": "12.3(11)YK1" }, { "status": "affected", "version": "12.3(11)YK2" }, { "status": "affected", "version": "12.3(11)YK3" }, { "status": "affected", "version": "12.3(2)JA3" }, { "status": "affected", "version": "12.3(2)JA4" }, { "status": "affected", "version": "12.3(11)JA2" }, { "status": "affected", "version": "12.3(11)YS" }, { "status": "affected", "version": "12.3(11)YS1" }, { "status": "affected", "version": "12.3(11)YS2" }, { "status": "affected", "version": "12.4(3e)" }, { "status": "affected", "version": "12.4(7b)" }, { "status": "affected", "version": "12.4(8)" }, { "status": "affected", "version": "12.4(5b)" }, { "status": "affected", "version": "12.4(7a)" }, { "status": "affected", "version": "12.4(3d)" }, { "status": "affected", "version": "12.4(1)" }, { "status": "affected", "version": "12.4(1a)" }, { "status": "affected", "version": "12.4(1b)" }, { "status": "affected", "version": "12.4(1c)" }, { "status": "affected", "version": "12.4(10)" }, { "status": "affected", "version": "12.4(3)" }, { "status": "affected", "version": "12.4(3a)" }, { "status": "affected", "version": "12.4(3b)" }, { "status": "affected", "version": "12.4(3c)" }, { "status": "affected", "version": "12.4(3f)" }, { "status": "affected", "version": "12.4(5)" }, { "status": "affected", "version": "12.4(5a)" }, { "status": "affected", "version": "12.4(7c)" }, { "status": "affected", "version": "12.4(7)" }, { "status": "affected", "version": "12.4(8a)" }, { "status": "affected", "version": "12.4(8b)" }, { "status": "affected", "version": "12.4(7d)" }, { "status": "affected", "version": "12.4(3g)" }, { "status": "affected", "version": "12.4(8c)" }, { "status": "affected", "version": "12.4(10b)" }, { "status": "affected", "version": "12.4(12)" }, { "status": "affected", "version": "12.4(12a)" }, { "status": "affected", "version": "12.4(12b)" }, { "status": "affected", "version": "12.4(13)" }, { "status": "affected", "version": "12.4(13a)" }, { "status": "affected", "version": "12.4(13b)" }, { "status": "affected", "version": "12.4(13c)" }, { "status": "affected", "version": "12.4(7e)" }, { "status": "affected", "version": "12.4(17)" }, { "status": "affected", "version": "12.4(25e)" }, { "status": "affected", "version": "12.4(18b)" }, { "status": "affected", "version": "12.4(18e)" }, { "status": "affected", "version": "12.4(25g)" }, { "status": "affected", "version": "12.4(3i)" }, { "status": "affected", "version": "12.4(3j)" }, { "status": "affected", "version": "12.4(23b)" }, { "status": "affected", "version": "12.4(3h)" }, { "status": "affected", "version": "12.4(7h)" }, { "status": "affected", "version": "12.4(25a)" }, { "status": "affected", "version": "12.4(16)" }, { "status": "affected", "version": "12.4(13d)" }, { "status": "affected", "version": "12.4(25)" }, { "status": "affected", "version": "12.4(25c)" }, { "status": "affected", "version": "12.4(19)" }, { "status": "affected", "version": "12.4(13e)" }, { "status": "affected", "version": "12.4(25b)" }, { "status": "affected", "version": "12.4(23)" }, { "status": "affected", "version": "12.4(10c)" }, { "status": "affected", "version": "12.4(21)" }, { "status": "affected", "version": "12.4(16b)" }, { "status": "affected", "version": "12.4(16a)" }, { "status": "affected", "version": "12.4(23a)" }, { "status": "affected", "version": "12.4(25d)" }, { "status": "affected", "version": "12.4(7f)" }, { "status": "affected", "version": "12.4(18)" }, { "status": "affected", "version": "12.4(21a)" }, { "status": "affected", "version": "12.4(13f)" }, { "status": "affected", "version": "12.4(25f)" }, { "status": "affected", "version": "12.4(18c)" }, { "status": "affected", "version": "12.4(5c)" }, { "status": "affected", "version": "12.4(8d)" }, { "status": "affected", "version": "12.4(12c)" }, { "status": "affected", "version": "12.4(17a)" }, { "status": "affected", "version": "12.4(18a)" }, { "status": "affected", "version": "12.4(17b)" }, { "status": "affected", "version": "12.4(7g)" }, { "status": "affected", "version": "12.3(8)JK" }, { "status": "affected", "version": "12.4(6)MR1" }, { "status": "affected", "version": "12.4(11)MR" }, { "status": "affected", "version": "12.4(2)MR" }, { "status": "affected", "version": "12.4(4)MR" }, { "status": "affected", "version": "12.4(6)MR" }, { "status": "affected", "version": "12.4(9)MR" }, { "status": "affected", "version": "12.4(12)MR" }, { "status": "affected", "version": "12.4(16)MR" }, { "status": "affected", "version": "12.4(16)MR1" }, { "status": "affected", "version": "12.4(19)MR2" }, { "status": "affected", "version": "12.4(19)MR1" }, { "status": "affected", "version": "12.4(19)MR" }, { "status": "affected", "version": "12.4(20)MR" }, { "status": "affected", "version": "12.4(4)MR1" }, { "status": "affected", "version": "12.4(19)MR3" }, { "status": "affected", "version": "12.4(12)MR1" }, { "status": "affected", "version": "12.4(20)MR2" }, { "status": "affected", "version": "12.4(16)MR2" }, { "status": "affected", "version": "12.4(12)MR2" }, { "status": "affected", "version": "12.4(2)MR1" }, { "status": "affected", "version": "12.4(20)MR1" }, { "status": "affected", "version": "12.4(4)T" }, { "status": "affected", "version": "12.4(4)T1" }, { "status": "affected", "version": "12.4(4)T2" }, { "status": "affected", "version": "12.4(4)T3" }, { "status": "affected", "version": "12.4(6)T" }, { "status": "affected", "version": "12.4(6)T1" }, { "status": "affected", "version": "12.4(6)T2" }, { "status": "affected", "version": "12.4(9)T" }, { "status": "affected", "version": "12.4(4)T4" }, { "status": "affected", "version": "12.4(2)T5" }, { "status": "affected", "version": "12.4(6)T3" }, { "status": "affected", "version": "12.4(2)T" }, { "status": "affected", "version": "12.4(11)T" }, { "status": "affected", "version": "12.4(15)T" }, { "status": "affected", "version": "12.4(20)T" }, { "status": "affected", "version": "12.4(24)T" }, { "status": "affected", "version": "12.4(24)T3" }, { "status": "affected", "version": "12.4(4)T8" }, { "status": "affected", "version": "12.4(20)T1" }, { "status": "affected", "version": "12.4(22)T1" }, { "status": "affected", "version": "12.4(15)T9" }, { "status": "affected", "version": "12.4(11)T4" }, { "status": "affected", "version": "12.4(15)T8" }, { "status": "affected", "version": "12.4(6)T5" }, { "status": "affected", "version": "12.4(15)T15" }, { "status": "affected", "version": "12.4(24)T5" }, { "status": "affected", "version": "12.4(15)T2" }, { "status": "affected", "version": "12.4(6)T8" }, { "status": "affected", "version": "12.4(15)T12" }, { "status": "affected", "version": "12.4(24)T4" }, { "status": "affected", "version": "12.4(6)T11" }, { "status": "affected", "version": "12.4(9)T5" }, { "status": "affected", "version": "12.4(20)T3" }, { "status": "affected", "version": "12.4(6)T4" }, { "status": "affected", "version": "12.4(4)T6" }, { "status": "affected", "version": "12.4(22)T" }, { "status": "affected", "version": "12.4(20)T6" }, { "status": "affected", "version": "12.4(9)T3" }, { "status": "affected", "version": "12.4(24)T8" }, { "status": "affected", "version": "12.4(6)T7" }, { "status": "affected", "version": "12.4(15)T13" }, { "status": "affected", "version": "12.4(6)T10" }, { "status": "affected", "version": "12.4(15)T3" }, { "status": "affected", "version": "12.4(24)T2" }, { "status": "affected", "version": "12.4(22)T5" }, { "status": "affected", "version": "12.4(2)T3" }, { "status": "affected", "version": "12.4(15)T10" }, { "status": "affected", "version": "12.4(22)T4" }, { "status": "affected", "version": "12.4(20)T5" }, { "status": "affected", "version": "12.4(9)T6" }, { "status": "affected", "version": "12.4(15)T4" }, { "status": "affected", "version": "12.4(2)T4" }, { "status": "affected", "version": "12.4(24)T1" }, { "status": "affected", "version": "12.4(9)T4" }, { "status": "affected", "version": "12.4(24)T7" }, { "status": "affected", "version": "12.4(22)T3" }, { "status": "affected", "version": "12.4(9)T1" }, { "status": "affected", "version": "12.4(24)T6" }, { "status": "affected", "version": "12.4(6)T9" }, { "status": "affected", "version": "12.4(15)T5" }, { "status": "affected", "version": "12.4(4)T7" }, { "status": "affected", "version": "12.4(20)T2" }, { "status": "affected", "version": "12.4(2)T1" }, { "status": "affected", "version": "12.4(11)T1" }, { "status": "affected", "version": "12.4(15)T11" }, { "status": "affected", "version": "12.4(2)T6" }, { "status": "affected", "version": "12.4(2)T2" }, { "status": "affected", "version": "12.4(15)T7" }, { "status": "affected", "version": "12.4(11)T2" }, { "status": "affected", "version": "12.4(9)T7" }, { "status": "affected", "version": "12.4(15)T14" }, { "status": "affected", "version": "12.4(11)T3" }, { "status": "affected", "version": "12.4(15)T6" }, { "status": "affected", "version": "12.4(15)T16" }, { "status": "affected", "version": "12.4(15)T1" }, { "status": "affected", "version": "12.4(9)T2" }, { "status": "affected", "version": "12.4(6)T6" }, { "status": "affected", "version": "12.4(22)T2" }, { "status": "affected", "version": "12.4(4)T5" }, { "status": "affected", "version": "12.4(20)T4" }, { "status": "affected", "version": "12.4(15)T17" }, { "status": "affected", "version": "12.3(14)YT" }, { "status": "affected", "version": "12.3(14)YT1" }, { "status": "affected", "version": "12.3(11)JX" }, { "status": "affected", "version": "12.3(7)JX9" }, { "status": "affected", "version": "12.3(11)JX1" }, { "status": "affected", "version": "12.3(4)TPC11b" }, { "status": "affected", "version": "12.3(4)TPC11a" }, { "status": "affected", "version": "12.4(2)XA" }, { "status": "affected", "version": "12.4(2)XA1" }, { "status": "affected", "version": "12.4(2)XA2" }, { "status": "affected", "version": "12.4(4)XC" }, { "status": "affected", "version": "12.4(4)XC1" }, { "status": "affected", "version": "12.4(4)XC5" }, { "status": "affected", "version": "12.4(4)XC7" }, { "status": "affected", "version": "12.4(4)XC3" }, { "status": "affected", "version": "12.4(4)XC4" }, { "status": "affected", "version": "12.4(4)XC2" }, { "status": "affected", "version": "12.4(4)XC6" }, { "status": "affected", "version": "12.4(6)XE" }, { "status": "affected", "version": "12.4(6)XE2" }, { "status": "affected", "version": "12.4(6)XE1" }, { "status": "affected", "version": "12.3(11)YZ1" }, { "status": "affected", "version": "12.3(11)YZ" }, { "status": "affected", "version": "12.3(11)YZ2" }, { "status": "affected", "version": "12.4(11)SW" }, { "status": "affected", "version": "12.4(15)SW6" }, { "status": "affected", "version": "12.4(15)SW" }, { "status": "affected", "version": "12.4(11)SW1" }, { "status": "affected", "version": "12.4(15)SW5" }, { "status": "affected", "version": "12.4(15)SW1" }, { "status": "affected", "version": "12.4(15)SW4" }, { "status": "affected", "version": "12.4(11)SW3" }, { "status": "affected", "version": "12.4(11)SW2" }, { "status": "affected", "version": "12.4(15)SW3" }, { "status": "affected", "version": "12.4(15)SW2" }, { "status": "affected", "version": "12.4(15)SW7" }, { "status": "affected", "version": "12.4(15)SW8" }, { "status": "affected", "version": "12.4(15)SW8a" }, { "status": "affected", "version": "12.4(15)SW9" }, { "status": "affected", "version": "12.4(11)XJ" }, { "status": "affected", "version": "12.4(11)XJ3" }, { "status": "affected", "version": "12.4(11)XJ2" }, { "status": "affected", "version": "12.4(11)XJ4" }, { "status": "affected", "version": "12.4(6)XT" }, { "status": "affected", "version": "12.4(6)XT1" }, { "status": "affected", "version": "12.4(6)XT2" }, { "status": "affected", "version": "12.4(11)MD2" }, { "status": "affected", "version": "12.4(11)XV" }, { "status": "affected", "version": "12.4(11)XV1" }, { "status": "affected", "version": "12.4(11)XW" }, { "status": "affected", "version": "12.4(11)XW3" }, { "status": "affected", "version": "12.4(11)XW7" }, { "status": "affected", "version": "12.4(11)XW10" }, { "status": "affected", "version": "12.4(11)XW8" }, { "status": "affected", "version": "12.4(11)XW9" }, { "status": "affected", "version": "12.4(11)XW6" }, { "status": "affected", "version": "12.4(11)XW4" }, { "status": "affected", "version": "12.4(11)XW1" }, { "status": "affected", "version": "12.4(11)XW5" }, { "status": "affected", "version": "12.4(11)XW2" }, { "status": "affected", "version": "12.4(15)XY4" }, { "status": "affected", "version": "12.4(15)XY5" }, { "status": "affected", "version": "12.4(15)XY1" }, { "status": "affected", "version": "12.4(15)XY" }, { "status": "affected", "version": "12.4(15)XY2" }, { "status": "affected", "version": "12.4(15)XY3" }, { "status": "affected", "version": "12.4(15)XZ" }, { "status": "affected", "version": "12.4(15)XZ2" }, { "status": "affected", "version": "12.4(15)XZ1" }, { "status": "affected", "version": "12.3(8)ZA" }, { "status": "affected", "version": "12.4(23c)JY" }, { "status": "affected", "version": "15.0(1)M1" }, { "status": "affected", "version": "15.0(1)M5" }, { "status": "affected", "version": "15.0(1)M4" }, { "status": "affected", "version": "15.0(1)M3" }, { "status": "affected", "version": "15.0(1)M2" }, { "status": "affected", "version": "15.0(1)M6" }, { "status": "affected", "version": "15.0(1)M" }, { "status": "affected", "version": "15.0(1)M7" }, { "status": "affected", "version": "15.0(1)M10" }, { "status": "affected", "version": "15.0(1)M9" }, { "status": "affected", "version": "15.0(1)M8" }, { "status": "affected", "version": "15.0(1)XA2" }, { "status": "affected", "version": "15.0(1)XA4" }, { "status": "affected", "version": "15.0(1)XA1" }, { "status": "affected", "version": "15.0(1)XA3" }, { "status": "affected", "version": "15.0(1)XA" }, { "status": "affected", "version": "15.0(1)XA5" }, { "status": "affected", "version": "15.1(2)T" }, { "status": "affected", "version": "15.1(1)T4" }, { "status": "affected", "version": "15.1(3)T2" }, { "status": "affected", "version": "15.1(1)T1" }, { "status": "affected", "version": "15.1(2)T0a" }, { "status": "affected", "version": "15.1(3)T3" }, { "status": "affected", "version": "15.1(1)T3" }, { "status": "affected", "version": "15.1(2)T3" }, { "status": "affected", "version": "15.1(2)T4" }, { "status": "affected", "version": "15.1(1)T2" }, { "status": "affected", "version": "15.1(3)T" }, { "status": "affected", "version": "15.1(2)T2a" }, { "status": "affected", "version": "15.1(3)T1" }, { "status": "affected", "version": "15.1(1)T" }, { "status": "affected", "version": "15.1(2)T2" }, { "status": "affected", "version": "15.1(2)T1" }, { "status": "affected", "version": "15.1(2)T5" }, { "status": "affected", "version": "15.1(3)T4" }, { "status": "affected", "version": "15.1(1)T5" }, { "status": "affected", "version": "15.1(1)XB" }, { "status": "affected", "version": "12.2(33)MRA" }, { "status": "affected", "version": "12.2(33)MRB5" }, { "status": "affected", "version": "12.2(33)MRB2" }, { "status": "affected", "version": "12.2(33)MRB1" }, { "status": "affected", "version": "12.2(33)MRB4" }, { "status": "affected", "version": "12.2(33)MRB" }, { "status": "affected", "version": "12.2(33)MRB3" }, { "status": "affected", "version": "12.2(33)MRB6" }, { "status": "affected", "version": "15.3(1)T" }, { "status": "affected", "version": "15.3(2)T" }, { "status": "affected", "version": "15.3(1)T1" }, { "status": "affected", "version": "15.3(1)T2" }, { "status": "affected", "version": "15.3(1)T3" }, { "status": "affected", "version": "15.3(1)T4" }, { "status": "affected", "version": "15.3(2)T1" }, { "status": "affected", "version": "15.3(2)T2" }, { "status": "affected", "version": "15.3(2)T3" }, { "status": "affected", "version": "15.3(2)T4" }, { "status": "affected", "version": "15.0(1)EY" }, { "status": "affected", "version": "15.0(1)EY2" }, { "status": "affected", "version": "12.4(20)MRB" }, { "status": "affected", "version": "12.4(20)MRB1" }, { "status": "affected", "version": "15.1(4)M3" }, { "status": "affected", "version": "15.1(4)M" }, { "status": "affected", "version": "15.1(4)M1" }, { "status": "affected", "version": "15.1(4)M2" }, { "status": "affected", "version": "15.1(4)M6" }, { "status": "affected", "version": "15.1(4)M5" }, { "status": "affected", "version": "15.1(4)M4" }, { "status": "affected", "version": "15.1(4)M7" }, { "status": "affected", "version": "15.1(4)M10" }, { "status": "affected", "version": "15.1(4)M8" }, { "status": "affected", "version": "15.1(4)M9" }, { "status": "affected", "version": "15.1(2)GC" }, { "status": "affected", "version": "15.1(2)GC1" }, { "status": "affected", "version": "15.1(2)GC2" }, { "status": "affected", "version": "15.1(4)GC" }, { "status": "affected", "version": "15.1(4)GC1" }, { "status": "affected", "version": "15.1(4)GC2" }, { "status": "affected", "version": "15.2(4)M" }, { "status": "affected", "version": "15.2(4)M1" }, { "status": "affected", "version": "15.2(4)M2" }, { "status": "affected", "version": "15.2(4)M4" }, { "status": "affected", "version": "15.2(4)M3" }, { "status": "affected", "version": "15.2(4)M5" }, { "status": "affected", "version": "15.2(4)M8" }, { "status": "affected", "version": "15.2(4)M10" }, { "status": "affected", "version": "15.2(4)M7" }, { "status": "affected", "version": "15.2(4)M6" }, { "status": "affected", "version": "15.2(4)M9" }, { "status": "affected", "version": "15.2(4)M6a" }, { "status": "affected", "version": "15.2(4)M11" }, { "status": "affected", "version": "15.0(2)SG11a" }, { "status": "affected", "version": "15.0(2)EX2" }, { "status": "affected", "version": "15.0(2)EX8" }, { "status": "affected", "version": "15.2(1)GC" }, { "status": "affected", "version": "15.2(1)GC1" }, { "status": "affected", "version": "15.2(1)GC2" }, { "status": "affected", "version": "15.2(2)GC" }, { "status": "affected", "version": "15.2(3)GC" }, { "status": "affected", "version": "15.2(3)GC1" }, { "status": "affected", "version": "15.2(4)GC" }, { "status": "affected", "version": "15.2(4)GC2" }, { "status": "affected", "version": "15.2(4)GC3" }, { "status": "affected", "version": "15.4(1)T" }, { "status": "affected", "version": "15.4(2)T" }, { "status": "affected", "version": "15.4(1)T2" }, { "status": "affected", "version": "15.4(1)T1" }, { "status": "affected", "version": "15.4(1)T3" }, { "status": "affected", "version": "15.4(2)T1" }, { "status": "affected", "version": "15.4(2)T3" }, { "status": "affected", "version": "15.4(2)T2" }, { "status": "affected", "version": "15.4(1)T4" }, { "status": "affected", "version": "15.4(2)T4" }, { "status": "affected", "version": "15.3(3)M" }, { "status": "affected", "version": "15.3(3)M1" }, { "status": "affected", "version": "15.3(3)M2" }, { "status": "affected", "version": "15.3(3)M3" }, { "status": "affected", "version": "15.3(3)M5" }, { "status": "affected", "version": "15.3(3)M4" }, { "status": "affected", "version": "15.3(3)M6" }, { "status": "affected", "version": "15.3(3)M7" }, { "status": "affected", "version": "15.3(3)M8" }, { "status": "affected", "version": "15.3(3)M9" }, { "status": "affected", "version": "15.3(3)M8a" }, { "status": "affected", "version": "15.4(3)M" }, { "status": "affected", "version": "15.4(3)M1" }, { "status": "affected", "version": "15.4(3)M2" }, { "status": "affected", "version": "15.4(3)M3" }, { "status": "affected", "version": "15.4(3)M4" }, { "status": "affected", "version": "15.4(3)M5" }, { "status": "affected", "version": "15.4(3)M6" }, { "status": "affected", "version": "15.4(3)M7" }, { "status": "affected", "version": "15.4(3)M6a" }, { "status": "affected", "version": "15.2(4)JAZ1" }, { "status": "affected", "version": "15.4(1)CG" }, { "status": "affected", "version": "15.4(1)CG1" }, { "status": "affected", "version": "15.4(2)CG" }, { "status": "affected", "version": "15.5(1)T" }, { "status": "affected", "version": "15.5(1)T1" }, { "status": "affected", "version": "15.5(2)T" }, { "status": "affected", "version": "15.5(1)T2" }, { "status": "affected", "version": "15.5(1)T3" }, { "status": "affected", "version": "15.5(2)T1" }, { "status": "affected", "version": "15.5(2)T2" }, { "status": "affected", "version": "15.5(2)T3" }, { "status": "affected", "version": "15.5(2)T4" }, { "status": "affected", "version": "15.5(1)T4" }, { "status": "affected", "version": "15.5(3)M" }, { "status": "affected", "version": "15.5(3)M1" }, { "status": "affected", "version": "15.5(3)M0a" }, { "status": "affected", "version": "15.5(3)M2" }, { "status": "affected", "version": "15.5(3)M3" }, { "status": "affected", "version": "15.5(3)M4" }, { "status": "affected", "version": "15.5(3)M4a" }, { "status": "affected", "version": "15.5(3)M5" }, { "status": "affected", "version": "15.3(3)JAA1" }, { "status": "affected", "version": "15.6(1)T" }, { "status": "affected", "version": "15.6(2)T" }, { "status": "affected", "version": "15.6(1)T0a" }, { "status": "affected", "version": "15.6(1)T1" }, { "status": "affected", "version": "15.6(2)T1" }, { "status": "affected", "version": "15.6(1)T2" }, { "status": "affected", "version": "15.6(2)T2" }, { "status": "affected", "version": "15.6(3)M" }, { "status": "affected", "version": "15.6(3)M1" }, { "status": "affected", "version": "15.6(3)M0a" }, { "status": "affected", "version": "15.6(3)M1b" }, { "status": "affected", "version": "15.6(3)M2" }, { "status": "affected", "version": "15.6(3)M2a" } ] }, { "product": "Universal Product", "vendor": "IntelliShield", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.\r\n\r The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload. Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.\r\n\r There are workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "At the time of initial publication, Cisco was aware of external knowledge of the vulnerabilities described in this advisory and, as a precaution, notified customers about the potential for exploitation.\r\n\r\nOn January 6, 2017, a security researcher published functional exploit code for these vulnerabilities.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) is aware of exploitation of the following vulnerabilities that are described in this advisory:\r\n\r\nCVE-2017-6736\r\nCVE-2017-6737\r\nCVE-2017-6738\r\nCVE-2017-6739\r\nCVE-2017-6740\r\nCVE-2017-6742\r\nCVE-2017-6743\r\nCVE-2017-6744\r\n\r\nThe Cisco PSIRT is aware of exploit code available for CVE-2017-6741.\r\n\r\nAdditional information can be found at Cisco TALOS: DNS Hijacking Abuses Trust In Core Internet Service [\"https://blog.talosintelligence.com/2019/04/seaturtle.html\"]." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "cvssV3_0" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2024-01-25T16:57:03.284Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-20170629-snmp", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "source": { "advisory": "cisco-sa-20170629-snmp", "defects": [ "CSCve78027", "CSCve60276" ], "discovery": "UNKNOWN" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6744", "datePublished": "2017-07-17T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-08-05T15:41:17.197Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6736
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2024-11-15 18:00
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve57697.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99345 | vdb-entry, x_refsource_BID | |
https://www.exploit-db.com/exploits/43450/ | exploit, x_refsource_EXPLOIT-DB | |
https://github.com/artkond/cisco-snmp-rce | x_refsource_MISC | |
http://www.securitytracker.com/id/1038808 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | Cisco IOS and IOS XE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.658Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "43450", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/43450/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/artkond/cisco-snmp-rce" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-6736", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:37:36.543844Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-6736" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T18:00:00.725Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve57697." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2018-01-07T10:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "43450", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/43450/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/artkond/cisco-snmp-rce" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6736", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve57697." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "99345", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99345" }, { "name": "43450", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/43450/" }, { "name": "https://github.com/artkond/cisco-snmp-rce", "refsource": "MISC", "url": "https://github.com/artkond/cisco-snmp-rce" }, { "name": "1038808", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038808" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6736", "datePublished": "2017-07-17T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-11-15T18:00:00.725Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6738
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2024-11-15 17:59
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve89865, CSCsy56638.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99345 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038808 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | Cisco IOS and IOS XE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.135Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-6738", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:36:26.152413Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-6738" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:59:27.374Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve89865, CSCsy56638." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-18T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6738", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve89865, CSCsy56638." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "99345", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038808" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6738", "datePublished": "2017-07-17T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-11-15T17:59:27.374Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6739
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2024-11-15 17:59
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66540.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99345 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038808 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | Cisco IOS and IOS XE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.090Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-6739", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:36:04.566448Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-6739" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:59:11.038Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66540." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-18T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6739", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66540." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "99345", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038808" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6739", "datePublished": "2017-07-17T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-11-15T17:59:11.038Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6741
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2024-08-05 15:41
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66658.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99345 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038808 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | Cisco IOS and IOS XE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.034Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66658." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-18T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6741", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66658." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "99345", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038808" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6741", "datePublished": "2017-07-17T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-08-05T15:41:17.034Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6742
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2024-11-15 17:58
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve54313.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99345 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038808 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | Cisco IOS and IOS XE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.132Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-6742", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:35:28.397376Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2023-04-19", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-6742" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:58:48.325Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve54313." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-18T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve54313." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "99345", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038808" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6742", "datePublished": "2017-07-17T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-11-15T17:58:48.325Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6743
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2024-11-15 17:58
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60376, CSCve78027.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99345 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038808 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | Cisco IOS and IOS XE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.269Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-6743", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:35:10.951116Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-6743" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:58:33.758Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60376, CSCve78027." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-18T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6743", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60376, CSCve78027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "99345", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038808" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6743", "datePublished": "2017-07-17T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-11-15T17:58:33.758Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2017-6740
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2024-11-15 17:58
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66601.
References
▼ | URL | Tags |
---|---|---|
http://www.securityfocus.com/bid/99345 | vdb-entry, x_refsource_BID | |
http://www.securitytracker.com/id/1038808 | vdb-entry, x_refsource_SECTRACK | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp | x_refsource_CONFIRM |
Impacted products
▼ | Vendor | Product |
---|---|---|
n/a | Cisco IOS and IOS XE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.239Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-6740", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:35:48.424441Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2017-6740" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2024-11-15T17:58:58.634Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Cisco IOS and IOS XE", "vendor": "n/a", "versions": [ { "status": "affected", "version": "Cisco IOS and IOS XE" } ] } ], "datePublic": "2017-07-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66601." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "CWE-119", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2017-07-18T09:57:01", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6740", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66601." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "99345", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038808" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ] } } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6740", "datePublished": "2017-07-17T21:00:00", "dateReserved": "2017-03-09T00:00:00", "dateUpdated": "2024-11-15T17:58:58.634Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading...
Loading...
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.