A vulnerability in the web user interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.
The vulnerability is due to insufficient resource handling by the affected software when the web user interface is under a high load. An attacker could exploit this vulnerability by sending a high number of requests to the web user interface of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
To exploit this vulnerability, the attacker must have access to the management interface of the affected software, which is typically connected to a restricted management network.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui”]
This advisory is part of the March 22, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes five Cisco Security Advisories that describe five vulnerabilities. All the vulnerabilities have a Security Impact Rating of High. For a complete list of the advisories and links to them, see Cisco Event Response: March 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [“https://sec.cloudapps.cisco.com/security/center/viewErp.x?alertId=ERP-60851”].
Vendor | Product | Version | CPE |
---|---|---|---|
cisco | cisco_ios | 3.2sg | cpe:2.3:o:cisco:cisco_ios:3.2sg:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.7s | cpe:2.3:o:cisco:cisco_ios:3.7s:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.3sg | cpe:2.3:o:cisco:cisco_ios:3.3sg:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.8s | cpe:2.3:o:cisco:cisco_ios:3.8s:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.9s | cpe:2.3:o:cisco:cisco_ios:3.9s:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.2se | cpe:2.3:o:cisco:cisco_ios:3.2se:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.3se | cpe:2.3:o:cisco:cisco_ios:3.3se:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.3xo | cpe:2.3:o:cisco:cisco_ios:3.3xo:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.4sg | cpe:2.3:o:cisco:cisco_ios:3.4sg:xe:*:*:*:*:*:* |
cisco | cisco_ios | 3.5e | cpe:2.3:o:cisco:cisco_ios:3.5e:xe:*:*:*:*:*:* |