Executive Summary
Summary | |
---|---|
Title | Cisco IOS XE Software Web User Interface Denial of Service Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20170322-webui | First vendor Publication | 2017-03-22 |
Vendor | Cisco | Last vendor Modification | 2017-03-22 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 7.8 | Attack Range | Network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the web user interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient resource handling by the affected software when the web user interface is under a high load. An attacker could exploit this vulnerability by sending a high number of requests to the web user interface of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. To exploit this vulnerability, the attacker must have access to the management interface of the affected software, which is typically connected to a restricted management network. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui ["http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui"] This advisory is part of the March 22, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes five Cisco Security Advisories that describe five vulnerabilities. All the vulnerabilities have a Security Impact Rating of High. For a complete list of the advisories and links to them, see Cisco Event Response: March 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication ["http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-60851"]. BEGIN PGP SIGNATURE iQKBBAEBAgBrBQJY0qKVZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHnzqhAA6te0GLkg0jYoclHu QvBTLc3CJj9usmyP9dFyFjy1txgNV/ds/oyc2crZ6Ci7aXCWtmnn/Ypumox86Qn0 +moL7E5svEi59SNh2B7uzcPxePT8ruDfx6iK56ocVZcofa4JuY7W44wpKYeKYGp4 Kyd3xyMeMXehAhzNanRV9l/vqUtyOeGRxCTQ4GFPBJJWbme/2I+uAo5IZ15kNfBd hWZLNi71xxCS7b4bPxT0+IfN2hqoqfgL+EpP0Syd+O7gtMfIFmhXEMJId87VgYmE obEi5hDWOJfz1JO5Sd7AcUOe4M5H5sV2nJ7563FTiMg9ZxkmyZv2rn5S9R+eNrCL k2letO1QPlggAWja7Ir8mEmMoDsFkZ7bYCo5dSOg/AjK3nQL6upyOjx136n8O4IQ QZtQedgz24UpzxNtzntVfiIX5VE71zFT9zqOTE4FFQ+yqHf85dRGFTfZxwUaotA6 OG1kEnTEwaQ0FgQdQWduVhMJOVmIYYBVZVa9jG3V8vWZsxKKki5WnfAOnKm0pNvE YjSLdl8FU7TxlZkYL7hAzPvw/8PRYdbGcmVgmEDB0nYdk1szxJTQh8Rf3vf/CXFP hEQeLOBo/CFO/u61auJfSFnp72pgO4W3JaOHxNxZXUAKZgQ/73AnFSoJgN5QDYpi b8QgxABB293e5VX3AR+4M67HD30= =1brZ END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-400 | Uncontrolled Resource Consumption ('Resource Exhaustion') |
CPE : Common Platform Enumeration
Snort® IPS/IDS
Date | Description |
---|---|
2017-03-23 | Cisco IOS XE webui denial of service attempt RuleID : 42071 - Revision : 1 - Type : SERVER-WEBAPP |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2017-03-29 | Name : The remote device is missing a vendor-supplied security patch. File : cisco-sa-20170322-webui.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2017-03-30 13:24:40 |
|
2017-03-28 21:23:55 |
|
2017-03-23 00:25:04 |
|
2017-03-22 21:22:53 |
|