6.1 Medium
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:N/I:N/A:C
6.5 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
56.6%
A vulnerability in the Autonomic Networking feature of Cisco IOS Software
could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload,
resulting in a denial of service (DoS) condition.
# SPDX-FileCopyrightText: 2017 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/o:cisco:ios";
if (description)
{
script_oid("1.3.6.1.4.1.25623.1.0.106991");
script_xref(name:"CISA", value:"Known Exploited Vulnerability (KEV) catalog");
script_xref(name:"URL", value:"https://www.cisa.gov/known-exploited-vulnerabilities-catalog");
script_cve_id("CVE-2017-6663");
script_tag(name:"cvss_base", value:"6.1");
script_tag(name:"cvss_base_vector", value:"AV:A/AC:L/Au:N/C:N/I:N/A:C");
script_version("2024-03-05T05:05:54+0000");
script_name("Cisco IOS Software Autonomic Networking Infrastructure Denial of Service Vulnerability");
script_xref(name:"URL", value:"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170726-anidos");
script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");
script_tag(name:"solution", value:"No known solution was made available for at least one year since the disclosure of this vulnerability.
Likely none will be provided anymore. General solution options are to upgrade to a newer release, disable respective features, remove the product or replace the product by another one.");
script_tag(name:"summary", value:"A vulnerability in the Autonomic Networking feature of Cisco IOS Software
could allow an unauthenticated, adjacent attacker to cause autonomic nodes of an affected system to reload,
resulting in a denial of service (DoS) condition.");
script_tag(name:"insight", value:"The vulnerability is due to an unknown condition in the Autonomic Networking
code of the affected software. An attacker could exploit this vulnerability by replaying captured packets to reset
the Autonomic Control Plane (ACP) channel of an affected system.");
script_tag(name:"impact", value:"A successful exploit could allow the attacker to reset the ACP channel of an
affected system and consequently cause the affected device to reload, resulting in a DoS condition.");
script_tag(name:"qod_type", value:"package");
script_tag(name:"solution_type", value:"WillNotFix");
script_tag(name:"last_modification", value:"2024-03-05 05:05:54 +0000 (Tue, 05 Mar 2024)");
script_tag(name:"severity_vector", value:"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H");
script_tag(name:"severity_origin", value:"NVD");
script_tag(name:"severity_date", value:"2024-03-04 22:59:19 +0000 (Mon, 04 Mar 2024)");
script_tag(name:"creation_date", value:"2017-07-28 09:13:57 +0700 (Fri, 28 Jul 2017)");
script_category(ACT_GATHER_INFO);
script_family("CISCO");
script_copyright("Copyright (C) 2017 Greenbone AG");
script_dependencies("gb_ssh_cisco_ios_get_version.nasl");
script_mandatory_keys("cisco_ios/version");
exit(0);
}
include("host_details.inc");
include("version_func.inc");
if (!version = get_app_version(cpe: CPE))
exit(0);
affected = make_list(
'15.2(3)E',
'15.2(3)E1',
'15.2(3)E2',
'15.2(3)E3',
'15.2(3)E4',
'15.2(3)E5',
'15.2(3a)E',
'15.2(3a)E1',
'15.2(3m)E2',
'15.2(3m)E3',
'15.2(3m)E6',
'15.2(3m)E8',
'15.2(4)E',
'15.2(4)E1',
'15.2(4)E2',
'15.2(4)E3',
'15.2(5)E',
'15.2(5)E1',
'15.2(5a)E',
'15.2(5b)E',
'15.3(3)S',
'15.3(3)S1',
'15.3(3)S10',
'15.3(3)S1a',
'15.3(3)S2',
'15.3(3)S3',
'15.3(3)S4',
'15.3(3)S5',
'15.3(3)S6',
'15.3(3)S7',
'15.3(3)S8',
'15.3(3)S8a',
'15.3(3)S9',
'15.4(1)S',
'15.4(1)S1',
'15.4(1)S2',
'15.4(1)S3',
'15.4(1)S4',
'15.4(2)S',
'15.4(2)S1',
'15.4(2)S2',
'15.4(2)S3',
'15.4(2)S4',
'15.4(3)S',
'15.4(3)S1',
'15.4(3)S2',
'15.4(3)S3',
'15.4(3)S4',
'15.4(3)S5',
'15.4(3)S5a',
'15.4(3)S6',
'15.4(3)S6a',
'15.4(3)S6b',
'15.4(3)S7',
'15.4(3)S7a',
'15.4(3)S8',
'15.5(1)S',
'15.5(1)S1',
'15.5(1)S2',
'15.5(1)S3',
'15.5(1)S4',
'15.5(2)S',
'15.5(2)S1',
'15.5(2)S2',
'15.5(2)S3',
'15.5(2)S4',
'15.5(3)S',
'15.5(3)S0a',
'15.5(3)S1',
'15.5(3)S1a',
'15.5(3)S2',
'15.5(3)S2a',
'15.5(3)S2b',
'15.5(3)S3',
'15.5(3)S3a',
'15.5(3)S4',
'15.5(3)S4a',
'15.5(3)S4b',
'15.5(3)S4d',
'15.5(3)S5',
'15.5(3)SN',
'15.6(1)S',
'15.6(1)S1',
'15.6(1)S1a',
'15.6(1)S2',
'15.6(1)S3',
'15.6(1)S4',
'15.6(1)T',
'15.6(1)T0a',
'15.6(1)T1',
'15.6(1)T2',
'15.6(2)S',
'15.6(2)S0a',
'15.6(2)S1',
'15.6(2)S2',
'15.6(2)S3',
'15.6(2)S4',
'15.6(2)SN',
'15.6(2)SP',
'15.6(2)SP1',
'15.6(2)SP1b',
'15.6(2)SP1c',
'15.6(2)SP2',
'15.6(2)SP2a',
'15.6(2)SP3',
'15.6(2)T',
'15.6(2)T1',
'15.6(2)T2',
'15.6(2)T3',
'15.6(3)M',
'15.6(3)M0a',
'15.6(3)M1',
'15.6(3)M1b',
'15.6(3)M2',
'15.6(3)M2a',
'15.6(3)M3',
'15.7(3)M');
foreach af (affected) {
if (version == af) {
report = report_fixed_ver(installed_version: version, fixed_version: "None");
security_message(port: 0, data: report);
exit(0);
}
}
exit(99);
6.1 Medium
CVSS2
Attack Vector
ADJACENT_NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
COMPLETE
AV:A/AC:L/Au:N/C:N/I:N/A:C
6.5 Medium
CVSS3
Attack Vector
ADJACENT
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
NONE
Availability Impact
HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
6.4 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
56.6%