Executive Summary

Title Cisco IOS XE Software Web User Interface Denial of Service Vulnerability
Name cisco-sa-20170322-webui First vendor Publication 2017-03-22
Vendor Cisco Last vendor Modification 2017-03-22
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 7.8 Attack Range Network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


A vulnerability in the web user interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.

The vulnerability is due to insufficient resource handling by the affected software when the web user interface is under a high load. An attacker could exploit this vulnerability by sending a high number of requests to the web user interface of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.

To exploit this vulnerability, the attacker must have access to the management interface of the affected software, which is typically connected to a restricted management network.

Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui ["http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui"]

This advisory is part of the March 22, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes five Cisco Security Advisories that describe five vulnerabilities. All the vulnerabilities have a Security Impact Rating of High. For a complete list of the advisories and links to them, see Cisco Event Response: March 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-60851"].


iQKBBAEBAgBrBQJY0qKVZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHnzqhAA6te0GLkg0jYoclHu QvBTLc3CJj9usmyP9dFyFjy1txgNV/ds/oyc2crZ6Ci7aXCWtmnn/Ypumox86Qn0 +moL7E5svEi59SNh2B7uzcPxePT8ruDfx6iK56ocVZcofa4JuY7W44wpKYeKYGp4 Kyd3xyMeMXehAhzNanRV9l/vqUtyOeGRxCTQ4GFPBJJWbme/2I+uAo5IZ15kNfBd hWZLNi71xxCS7b4bPxT0+IfN2hqoqfgL+EpP0Syd+O7gtMfIFmhXEMJId87VgYmE obEi5hDWOJfz1JO5Sd7AcUOe4M5H5sV2nJ7563FTiMg9ZxkmyZv2rn5S9R+eNrCL k2letO1QPlggAWja7Ir8mEmMoDsFkZ7bYCo5dSOg/AjK3nQL6upyOjx136n8O4IQ QZtQedgz24UpzxNtzntVfiIX5VE71zFT9zqOTE4FFQ+yqHf85dRGFTfZxwUaotA6 OG1kEnTEwaQ0FgQdQWduVhMJOVmIYYBVZVa9jG3V8vWZsxKKki5WnfAOnKm0pNvE YjSLdl8FU7TxlZkYL7hAzPvw/8PRYdbGcmVgmEDB0nYdk1szxJTQh8Rf3vf/CXFP hEQeLOBo/CFO/u61auJfSFnp72pgO4W3JaOHxNxZXUAKZgQ/73AnFSoJgN5QDYpi b8QgxABB293e5VX3AR+4M67HD30= =1brZ END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-400 Uncontrolled Resource Consumption ('Resource Exhaustion')

CPE : Common Platform Enumeration

Os 198

Snort® IPS/IDS

Date Description
2017-03-23 Cisco IOS XE webui denial of service attempt
RuleID : 42071 - Revision : 1 - Type : SERVER-WEBAPP

Nessus® Vulnerability Scanner

Date Description
2017-03-29 Name : The remote device is missing a vendor-supplied security patch.
File : cisco-sa-20170322-webui.nasl - Type : ACT_GATHER_INFO

Alert History

If you want to see full details history, please login or register.
Date Informations
2017-03-30 13:24:40
  • Multiple Updates
2017-03-28 21:23:55
  • Multiple Updates
2017-03-23 00:25:04
  • Multiple Updates
2017-03-22 21:22:53
  • First insertion