Executive Summary

Summary
Title Cisco IOS and IOS XE Software Autonomic Networking Infrastructure Denial of Service Vulnerability
Informations
Name cisco-sa-20170726-anidos First vendor Publication 2017-07-26
Vendor Cisco Last vendor Modification 2017-07-26
Severity (Vendor) N/A Revision N/A

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:A/AC:L/Au:N/C:N/I:N/A:C)
Cvss Base Score 6.1 Attack Range Adjacent network
Cvss Impact Score 6.9 Attack Complexity Low
Cvss Expoit Score 6.5 Authentication None Required
Calculate full CVSS 2.0 Vectors scores

Detail

A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload, resulting in a denial of service (DoS) condition.

The vulnerability is due to an unknown condition in the Autonomic Networking code of the affected software. An attacker could exploit this vulnerability by replaying captured packets to reset the Autonomic Control Plane (ACP) channel of an affected system. A successful exploit could allow the attacker to reset the ACP channel of an affected system and consequently cause the affected device to reload, resulting in a DoS condition.

Cisco has not released software updates that address this vulnerability. There are no workarounds that address this vulnerability.

This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos"]

BEGIN PGP SIGNATURE

iQKBBAEBAgBrBQJZeL4JZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHnr0w/5AduEophk0wfRt5OK /VtnGl9IC9CO+RhOZMNQeP1QR+USHJ1mlM0TfFQSdIcp9niWUZpphsUt86U/D4Wh 1RUR8+cp2/qO6qB17ruluXeLvhfIbeNcvBgInKxBi3wm2CKiXCUVbJIzL5Lvwens 5aBpIh+5syaCUADrrmGIZ3SDm3vuGw0S7zjy9kTXyhlKRsrQkFmrPKQ4OhYgVc7l XJXTAJ7eOWq+PaHtlZmfmKS2xAaYKO/hWIkaI0hmyuLYzJU4hzonNQTmBm5jXw38 HwrHEo9Y04zQUUlzxqmpoO6rCBDWmkNCfVPSH/UvVy4wFZ6J7UZfBhS8Vfde75y5 JZKdLK9htojfNERYLZPAFKB1ZJll6jPKOcu4qNNVt2o/ZSEXJh6KOP9eizI76kG8 KfcJSPumtLhhrmf2My/dMa9V+9W8TbURD24wpnFnvyep8WaMfrvhgBke2tNgkAGX Khpr3uQNmEp3cA324RanSTP/m421g5WPXY8IKv3evoFQS3L4I7RU3cf4TZrhcxI4 uBlO5CBK8Pi6MpxEjxNQ2DNFYpbFlRfkKc19WBkoZDtcZwI/v1KlmfLfipa5AN97 XQRLO9xJMCXhe65+R0nQotml0c3/zt5zWSCk8mebV3CSrH+7cPRo2FrWzV5c3Xgi 5V5LOjtcQAXcO93+4EiRm35G6IU= =rimL END PGP SIGNATURE

_______________________________________________ cust-security-announce mailing list cust-security-announce@cisco.com To unsubscribe, send the command "unsubscribe" in the subject of your message to cust-security-announce-leave@cisco.com

Original Source

Url : http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco (...)

CPE : Common Platform Enumeration

TypeDescriptionCount
Os 117
Os 69

Alert History

If you want to see full details history, please login or register.
0
1
2
Date Informations
2017-08-10 21:25:48
  • Multiple Updates
2017-08-07 12:03:40
  • Multiple Updates
2017-07-26 21:22:50
  • First insertion