Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
0

CVE-2017-6627

Disclosure Date: September 07, 2017
Exploited in the Wild
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
3.6
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
None
Integrity (I):
None
Availability (A):
High

General Information

Vendors

  • cisco

Products

  • ios 15.1(2)gc,
  • ios 15.1(2)gc1,
  • ios 15.1(2)gc2,
  • ios 15.1(4)gc,
  • ios 15.1(4)gc1,
  • ios 15.1(4)gc2,
  • ios 15.2(1)gc,
  • ios 15.2(1)gc1,
  • ios 15.2(1)gc2,
  • ios 15.2(2)gc,
  • ios 15.2(3)gc,
  • ios 15.2(3)gc1,
  • ios 15.2(3r)gca,
  • ios 15.2(4)gc,
  • ios 15.2(4)gc1,
  • ios 15.2(4)gc2,
  • ios 15.2(4)gc3,
  • ios 15.4(1)t,
  • ios 15.4(1)t1,
  • ios 15.4(1)t2,
  • ios 15.4(1)t3,
  • ios 15.4(1)t4,
  • ios 15.4(2)t,
  • ios 15.4(2)t1,
  • ios 15.4(2)t2,
  • ios 15.4(3)m,
  • ios 15.4(3)m1,
  • ios 15.4(3)m2,
  • ios 15.4(3)m2.2,
  • ios 15.4(3)m3,
  • ios 15.4(3)m4,
  • ios 15.4(3)m5,
  • ios 15.4(3)m6,
  • ios 15.4(3)m6a,
  • ios 15.4(3)m7,
  • ios xe 3.14.0s,
  • ios xe 3.14.1s,
  • ios xe 3.14.2s,
  • ios xe 3.14.3s,
  • ios xe 3.14.4s,
  • ios xe 3.15.0s,
  • ios xe 3.15.1cs,
  • ios xe 3.15.1s,
  • ios xe 3.15.2s,
  • ios xe 3.15.3s,
  • ios xe 3.15.4s,
  • ios xe 3.16.0cs,
  • ios xe 3.16.0s,
  • ios xe 3.16.1as,
  • ios xe 3.16.1s,
  • ios xe 3.16.2as,
  • ios xe 3.16.2bs,
  • ios xe 3.16.2s,
  • ios xe 3.16.3as,
  • ios xe 3.16.3s,
  • ios xe 3.16.4as,
  • ios xe 3.16.4bs,
  • ios xe 3.16.4ds,
  • ios xe 3.16.4s,
  • ios xe 3.16.5s,
  • ios xe 3.16.6s,
  • ios xe 3.17.0s,
  • ios xe 3.17.1as,
  • ios xe 3.17.1s,
  • ios xe 3.17.3s,
  • ios xe 3.18.0as,
  • ios xe 3.18.0s,
  • ios xe 3.18.1s,
  • ios xe 3.18.2s,
  • ios xe 3.18.3s,
  • ios xe 3.18.3vs

Exploited in the Wild

Reported by:

Additional Info

Technical Analysis