Lucene search

K
cve[email protected]CVE-2017-6740
HistoryJul 17, 2017 - 9:29 p.m.

CVE-2017-6740

2017-07-1721:29:00
CWE-119
web.nvd.nist.gov
858
In Wild
1
cisco
snmp
vulnerability
code execution
system reload
buffer overflow
ipv4
ipv6
nvd

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.016 Low

EPSS

Percentile

87.5%

The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve66601.

Affected configurations

NVD
Node
ciscoiosMatch12.1\(13\)e3
OR
ciscoiosMatch12.1\(13\)e4
OR
ciscoiosMatch12.1\(13\)e5
OR
ciscoiosMatch12.1\(13\)e6
OR
ciscoiosMatch12.1\(13\)e7
OR
ciscoiosMatch12.1\(13\)e8
OR
ciscoiosMatch12.1\(13\)e9
OR
ciscoiosMatch12.1\(13\)e10
OR
ciscoiosMatch12.1\(13\)e11
OR
ciscoiosMatch12.1\(13\)e12
OR
ciscoiosMatch12.1\(13\)e13
OR
ciscoiosMatch12.1\(13\)e14
OR
ciscoiosMatch12.1\(13\)e15
OR
ciscoiosMatch12.1\(13\)e16
OR
ciscoiosMatch12.1\(13\)e17
OR
ciscoiosMatch12.1\(19\)e
OR
ciscoiosMatch12.1\(19\)e1
OR
ciscoiosMatch12.1\(20\)e
OR
ciscoiosMatch12.1\(20\)e1
OR
ciscoiosMatch12.1\(20\)e3
OR
ciscoiosMatch12.1\(20\)e4
OR
ciscoiosMatch12.1\(20\)e6
OR
ciscoiosMatch12.1\(22\)e
OR
ciscoiosMatch12.1\(22\)e1
OR
ciscoiosMatch12.1\(22\)e2
OR
ciscoiosMatch12.1\(22\)e3
OR
ciscoiosMatch12.1\(22\)e4
OR
ciscoiosMatch12.1\(22\)e5
OR
ciscoiosMatch12.1\(22\)e6
OR
ciscoiosMatch12.1\(23\)e
OR
ciscoiosMatch12.1\(23\)e1
OR
ciscoiosMatch12.1\(23\)e2
OR
ciscoiosMatch12.1\(23\)e3
OR
ciscoiosMatch12.1\(23\)e4
OR
ciscoiosMatch12.1\(26\)e
OR
ciscoiosMatch12.1\(26\)e1
OR
ciscoiosMatch12.1\(26\)e2
OR
ciscoiosMatch12.1\(26\)e3
OR
ciscoiosMatch12.1\(26\)e4
OR
ciscoiosMatch12.1\(26\)e5
OR
ciscoiosMatch12.1\(26\)e6
OR
ciscoiosMatch12.1\(26\)e7
OR
ciscoiosMatch12.1\(26\)e8
OR
ciscoiosMatch12.1\(26\)e9
OR
ciscoiosMatch12.1\(27b\)e
OR
ciscoiosMatch12.1\(27b\)e1
OR
ciscoiosMatch12.1\(27b\)e2
OR
ciscoiosMatch12.1\(27b\)e3
OR
ciscoiosMatch12.1\(27b\)e4
OR
ciscoiosMatch12.2\(14\)za
OR
ciscoiosMatch12.2\(14\)za2
OR
ciscoiosMatch12.2\(14\)za3
OR
ciscoiosMatch12.2\(14\)za4
OR
ciscoiosMatch12.2\(14\)za5
OR
ciscoiosMatch12.2\(14\)za6
OR
ciscoiosMatch12.2\(14\)za7
OR
ciscoiosMatch12.2\(17a\)sx1
OR
ciscoiosMatch12.2\(17a\)sx2
OR
ciscoiosMatch12.2\(17a\)sx4
OR
ciscoiosMatch12.2\(17b\)sxa2
OR
ciscoiosMatch12.2\(17d\)sxb1
OR
ciscoiosMatch12.2\(17d\)sxb2
OR
ciscoiosMatch12.2\(17d\)sxb3
OR
ciscoiosMatch12.2\(17d\)sxb4
OR
ciscoiosMatch12.2\(17d\)sxb5
OR
ciscoiosMatch12.2\(17d\)sxb6
OR
ciscoiosMatch12.2\(17d\)sxb7
OR
ciscoiosMatch12.2\(17d\)sxb8
OR
ciscoiosMatch12.2\(17d\)sxb9
OR
ciscoiosMatch12.2\(17d\)sxb10
OR
ciscoiosMatch12.2\(17d\)sxb11
OR
ciscoiosMatch12.2\(17d\)sxb11a
OR
ciscoiosMatch12.2\(18\)s
OR
ciscoiosMatch12.2\(18\)s1
OR
ciscoiosMatch12.2\(18\)s2
OR
ciscoiosMatch12.2\(18\)s3
OR
ciscoiosMatch12.2\(18\)s4
OR
ciscoiosMatch12.2\(18\)s8
OR
ciscoiosMatch12.2\(18\)s9
OR
ciscoiosMatch12.2\(18\)s10
OR
ciscoiosMatch12.2\(18\)s11
OR
ciscoiosMatch12.2\(18\)s12
OR
ciscoiosMatch12.2\(18\)s13
OR
ciscoiosMatch12.2\(18\)sxd1
OR
ciscoiosMatch12.2\(18\)sxf
OR
ciscoiosMatch12.2\(18\)sxf2
OR
ciscoiosMatch12.2\(18\)sxf3
OR
ciscoiosMatch12.2\(18\)sxf4
OR
ciscoiosMatch12.2\(18\)sxf5
OR
ciscoiosMatch12.2\(18\)sxf6
OR
ciscoiosMatch12.2\(18\)sxf7
OR
ciscoiosMatch12.2\(18\)sxf8
OR
ciscoiosMatch12.2\(18\)sxf9
OR
ciscoiosMatch12.2\(18\)sxf10
OR
ciscoiosMatch12.2\(18\)sxf10a
OR
ciscoiosMatch12.2\(18\)sxf11
OR
ciscoiosMatch12.2\(18\)sxf12
OR
ciscoiosMatch12.2\(18\)sxf12a
OR
ciscoiosMatch12.2\(18\)sxf13
OR
ciscoiosMatch12.2\(18\)sxf14
OR
ciscoiosMatch12.2\(18\)sxf15
OR
ciscoiosMatch12.2\(18\)sxf15a
OR
ciscoiosMatch12.2\(18\)sxf16
OR
ciscoiosMatch12.2\(18\)sxf17
OR
ciscoiosMatch12.2\(18\)sxf17a
OR
ciscoiosMatch12.2\(18\)sxf17b

CNA Affected

[
  {
    "product": "Cisco IOS and IOS XE",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco IOS and IOS XE"
      }
    ]
  }
]

Social References

More

9 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:S/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

9 High

AI Score

Confidence

High

0.016 Low

EPSS

Percentile

87.5%