CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%
A vulnerability in the DHCP snooping feature of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload unexpectedly, resulting in a denial of service (DoS) condition.
This vulnerability is due to a crafted IPv4 DHCP request packet being mishandled when endpoint analytics are enabled. An attacker could exploit this vulnerability by sending a crafted DHCP request through an affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a DoS condition.
Note: The attack vector is listed as network because a DHCP relay anywhere on the network could allow exploits from networks other than the adjacent one.
[
{
"vendor": "Cisco",
"product": "Cisco IOS XE Software",
"versions": [
{
"version": "17.1.1",
"status": "affected"
},
{
"version": "17.1.1a",
"status": "affected"
},
{
"version": "17.1.1s",
"status": "affected"
},
{
"version": "17.1.1t",
"status": "affected"
},
{
"version": "17.1.3",
"status": "affected"
},
{
"version": "17.2.1",
"status": "affected"
},
{
"version": "17.2.1r",
"status": "affected"
},
{
"version": "17.2.1a",
"status": "affected"
},
{
"version": "17.2.1v",
"status": "affected"
},
{
"version": "17.2.2",
"status": "affected"
},
{
"version": "17.2.3",
"status": "affected"
},
{
"version": "17.3.1",
"status": "affected"
},
{
"version": "17.3.2",
"status": "affected"
},
{
"version": "17.3.3",
"status": "affected"
},
{
"version": "17.3.1a",
"status": "affected"
},
{
"version": "17.3.1w",
"status": "affected"
},
{
"version": "17.3.2a",
"status": "affected"
},
{
"version": "17.3.1x",
"status": "affected"
},
{
"version": "17.3.1z",
"status": "affected"
},
{
"version": "17.3.4",
"status": "affected"
},
{
"version": "17.3.5",
"status": "affected"
},
{
"version": "17.3.4a",
"status": "affected"
},
{
"version": "17.3.6",
"status": "affected"
},
{
"version": "17.3.4b",
"status": "affected"
},
{
"version": "17.3.4c",
"status": "affected"
},
{
"version": "17.3.5a",
"status": "affected"
},
{
"version": "17.3.5b",
"status": "affected"
},
{
"version": "17.3.7",
"status": "affected"
},
{
"version": "17.3.8",
"status": "affected"
},
{
"version": "17.3.8a",
"status": "affected"
},
{
"version": "17.4.1",
"status": "affected"
},
{
"version": "17.4.2",
"status": "affected"
},
{
"version": "17.4.1a",
"status": "affected"
},
{
"version": "17.4.1b",
"status": "affected"
},
{
"version": "17.4.2a",
"status": "affected"
},
{
"version": "17.5.1",
"status": "affected"
},
{
"version": "17.5.1a",
"status": "affected"
},
{
"version": "17.6.1",
"status": "affected"
},
{
"version": "17.6.2",
"status": "affected"
},
{
"version": "17.6.1w",
"status": "affected"
},
{
"version": "17.6.1a",
"status": "affected"
},
{
"version": "17.6.1x",
"status": "affected"
},
{
"version": "17.6.3",
"status": "affected"
},
{
"version": "17.6.1y",
"status": "affected"
},
{
"version": "17.6.1z",
"status": "affected"
},
{
"version": "17.6.3a",
"status": "affected"
},
{
"version": "17.6.4",
"status": "affected"
},
{
"version": "17.6.1z1",
"status": "affected"
},
{
"version": "17.6.5",
"status": "affected"
},
{
"version": "17.6.6",
"status": "affected"
},
{
"version": "17.6.6a",
"status": "affected"
},
{
"version": "17.6.5a",
"status": "affected"
},
{
"version": "17.7.1",
"status": "affected"
},
{
"version": "17.7.1a",
"status": "affected"
},
{
"version": "17.7.1b",
"status": "affected"
},
{
"version": "17.7.2",
"status": "affected"
},
{
"version": "17.10.1",
"status": "affected"
},
{
"version": "17.10.1a",
"status": "affected"
},
{
"version": "17.10.1b",
"status": "affected"
},
{
"version": "17.8.1",
"status": "affected"
},
{
"version": "17.8.1a",
"status": "affected"
},
{
"version": "17.9.1",
"status": "affected"
},
{
"version": "17.9.1w",
"status": "affected"
},
{
"version": "17.9.2",
"status": "affected"
},
{
"version": "17.9.1a",
"status": "affected"
},
{
"version": "17.9.1x",
"status": "affected"
},
{
"version": "17.9.1y",
"status": "affected"
},
{
"version": "17.9.3",
"status": "affected"
},
{
"version": "17.9.2a",
"status": "affected"
},
{
"version": "17.9.1x1",
"status": "affected"
},
{
"version": "17.9.3a",
"status": "affected"
},
{
"version": "17.9.4",
"status": "affected"
},
{
"version": "17.9.1y1",
"status": "affected"
},
{
"version": "17.9.4a",
"status": "affected"
},
{
"version": "17.11.1",
"status": "affected"
},
{
"version": "17.11.1a",
"status": "affected"
},
{
"version": "17.12.1",
"status": "affected"
},
{
"version": "17.12.1w",
"status": "affected"
},
{
"version": "17.12.1a",
"status": "affected"
},
{
"version": "17.11.99SW",
"status": "affected"
}
]
}
]
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
AI Score
Confidence
High
EPSS
Percentile
9.0%