Executive Summary
Summary | |
---|---|
Title | Cisco IOS and IOS XE Software Autonomic Networking Infrastructure Denial of Service Vulnerability |
Informations | |||
---|---|---|---|
Name | cisco-sa-20170726-anidos | First vendor Publication | 2017-07-26 |
Vendor | Cisco | Last vendor Modification | 2017-07-26 |
Severity (Vendor) | N/A | Revision | N/A |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:A/AC:L/Au:N/C:N/I:N/A:C) | |||
---|---|---|---|
Cvss Base Score | 6.1 | Attack Range | Adjacent network |
Cvss Impact Score | 6.9 | Attack Complexity | Low |
Cvss Expoit Score | 6.5 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to an unknown condition in the Autonomic Networking code of the affected software. An attacker could exploit this vulnerability by replaying captured packets to reset the Autonomic Control Plane (ACP) channel of an affected system. A successful exploit could allow the attacker to reset the ACP channel of an affected system and consequently cause the affected device to reload, resulting in a DoS condition. Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos"] BEGIN PGP SIGNATURE iQKBBAEBAgBrBQJZeL4JZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHnr0w/5AduEophk0wfRt5OK /VtnGl9IC9CO+RhOZMNQeP1QR+USHJ1mlM0TfFQSdIcp9niWUZpphsUt86U/D4Wh 1RUR8+cp2/qO6qB17ruluXeLvhfIbeNcvBgInKxBi3wm2CKiXCUVbJIzL5Lvwens 5aBpIh+5syaCUADrrmGIZ3SDm3vuGw0S7zjy9kTXyhlKRsrQkFmrPKQ4OhYgVc7l XJXTAJ7eOWq+PaHtlZmfmKS2xAaYKO/hWIkaI0hmyuLYzJU4hzonNQTmBm5jXw38 HwrHEo9Y04zQUUlzxqmpoO6rCBDWmkNCfVPSH/UvVy4wFZ6J7UZfBhS8Vfde75y5 JZKdLK9htojfNERYLZPAFKB1ZJll6jPKOcu4qNNVt2o/ZSEXJh6KOP9eizI76kG8 KfcJSPumtLhhrmf2My/dMa9V+9W8TbURD24wpnFnvyep8WaMfrvhgBke2tNgkAGX Khpr3uQNmEp3cA324RanSTP/m421g5WPXY8IKv3evoFQS3L4I7RU3cf4TZrhcxI4 uBlO5CBK8Pi6MpxEjxNQ2DNFYpbFlRfkKc19WBkoZDtcZwI/v1KlmfLfipa5AN97 XQRLO9xJMCXhe65+R0nQotml0c3/zt5zWSCk8mebV3CSrH+7cPRo2FrWzV5c3Xgi 5V5LOjtcQAXcO93+4EiRm35G6IU= =rimL END PGP SIGNATURE _______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com |
Original Source
Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...) |
CPE : Common Platform Enumeration
Alert History
Date | Informations |
---|---|
2017-08-10 21:25:48 |
|
2017-08-07 12:03:40 |
|
2017-07-26 21:22:50 |
|