CVE-2017-12238

Severity

32%

Complexity

65%

Confidentiality

48%

A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS 15.0 through 15.4 for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory management issue in the affected software. An attacker could exploit this vulnerability by creating a large number of VPLS-generated MAC entries in the MAC address table of an affected device. A successful exploit could allow the attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a DoS condition. This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces. Cisco Bug IDs: CSCva61927.

A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS 15.0 through 15.4 for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory management issue in the affected software. An attacker could exploit this vulnerability by creating a large number of VPLS-generated MAC entries in the MAC address table of an affected device. A successful exploit could allow the attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a DoS condition. This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces. Cisco Bug IDs: CSCva61927.

CVSS 3.0 Base Score 6.5. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: low. CVSS Vector: (CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).

CVSS 2.0 Base Score 3.3. CVSS Attack Vector: adjacent_network. CVSS Attack Complexity: low. CVSS Vector: (AV:A/AC:L/Au:N/C:N/I:N/A:P).

Overview

Type

Cisco IOS

First reported 7 years ago

2017-09-29 01:34:00

Last updated 5 years ago

2019-10-09 23:22:00

Affected Software

Cisco IOS 15.0(1)SY1

15.0\(1\)sy1

Cisco IOS 15.1(1)SY

15.1\(1\)sy

Cisco IOS 15.1(1)SY1

15.1\(1\)sy1

Cisco IOS 15.1(1)SY2

15.1\(1\)sy2

Cisco IOS 15.1(1)SY3

15.1\(1\)sy3

Cisco IOS 15.1(1)SY4

15.1\(1\)sy4

Cisco IOS 15.1(1)SY5

15.1\(1\)sy5

Cisco IOS 15.1(1)SY6

15.1\(1\)sy6

Cisco IOS 15.1(2)SY

15.1\(2\)sy

Cisco IOS 15.1(2)SY1

15.1\(2\)sy1

Cisco IOS 15.1(2)SY2

15.1\(2\)sy2

Cisco IOS 151.1(2)SY3

15.1\(2\)sy3

Cisco IOS 15.1(2)SY4

15.1\(2\)sy4

Cisco IOS 15.1(2)SY4A

15.1\(2\)sy4a

Cisco IOS 15.1(2)SY5

15.1\(2\)sy5

Cisco IOS 15.1(2)SY6

15.1\(2\)sy6

Cisco IOS 15.1(2)SY7

15.1\(2\)sy7

Cisco IOS 15.1(2)SY8

15.1\(2\)sy8

Cisco IOS 15.1(2)SY10

15.1\(2\)sy10

Cisco IOS 15.2(1)SY

15.2\(1\)sy

Cisco IOS 15.2(1)SY0A

15.2\(1\)sy0a

Cisco IOS 15.2(1)SY1

15.2\(1\)sy1

Cisco IOS 15.2(1)SY1A

15.2\(1\)sy1a

Cisco IOS 15.2(1)SY2

15.2\(1\)sy2

Cisco IOS 15.2(1)SY3

15.2\(1\)sy3

Cisco IOS 15.2(1)SY4

15.2\(1\)sy4

Cisco IOS 15.2(2)SY

15.2\(2\)sy

Cisco IOS 15.2(2)SY1

15.2\(2\)sy1

Cisco IOS 15.2(2)SY2

15.2\(2\)sy2

Cisco IOS 15.3(1)SY

15.3\(1\)sy

Cisco IOS 15.3(1)SY1

15.3\(1\)sy1

Cisco IOS 15.3(1)SY2

15.3\(1\)sy2

Cisco IOS 15.4(1)SY

15.4\(1\)sy

Stay updated

ExploitPedia is constantly evolving. Sign up to receive a notification when we release additional functionality.

Get in touch

If you'd like to report a bug or have any suggestions for improvements then please do get in touch with us using this form. We will get back to you as soon as we can.