Unknown
CVE-2017-6720
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2017-6720
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
A vulnerability in the Secure Shell (SSH) subsystem of Cisco Small Business Managed Switches software could allow an authenticated, remote attacker to cause a reload of the affected switch, resulting in a denial of service (DoS) condition. The vulnerability is due to improper processing of SSH connections. An attacker could exploit this vulnerability by logging in to an affected switch via SSH and sending a malicious SSH message. This vulnerability affects the following Cisco products when SSH is enabled: Small Business 300 Series Managed Switches, Small Business 500 Series Stackable Managed Switches, 350 Series Managed Switches, 350X Series Stackable Managed Switches, 550X Series Stackable Managed Switches, ESW2 Series Advanced Switches. Cisco Bug IDs: CSCvb48377.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
Products
- esw2-350g-52 firmware,
- esw2-350g-52dc firmware,
- esw2-550x-48 firmware,
- esw2-550x-48dc firmware,
- sf300-08 firmware,
- sf300-24 firmware,
- sf300-24mp firmware,
- sf300-24p firmware,
- sf300-24pp firmware,
- sf300-48 firmware,
- sf300-48p firmware,
- sf300-48pp firmware,
- sf302-08 firmware,
- sf302-08mp firmware,
- sf302-08mpp firmware,
- sf302-08p firmware,
- sf302-08pp firmware,
- sf350-48 firmware,
- sf350-48mp firmware,
- sf350-48p firmware,
- sf500-24 firmware,
- sf500-24p firmware,
- sf500-48 firmware,
- sf500-48p firmware,
- sf550x-24 firmware,
- sf550x-24mp firmware,
- sf550x-24p firmware,
- sf550x-48 firmware,
- sf550x-48mp firmware,
- sf550x-48p firmware,
- sg300-10 firmware,
- sg300-10mp firmware,
- sg300-10mpp firmware,
- sg300-10p firmware,
- sg300-10pp firmware,
- sg300-10sfp firmware,
- sg300-20 firmware,
- sg300-28 firmware,
- sg300-28mp firmware,
- sg300-28p firmware,
- sg300-28pp firmware,
- sg300-52 firmware,
- sg300-52mp firmware,
- sg300-52p firmware,
- sg350-10 firmware,
- sg350-10mp firmware,
- sg350-10p firmware,
- sg350-28 firmware,
- sg350-28mp firmware,
- sg350-28p firmware,
- sg350x-24 firmware,
- sg350x-24mp firmware,
- sg350x-24p firmware,
- sg350x-48 firmware,
- sg350x-48mp firmware,
- sg350x-48p firmware,
- sg350xg-24f firmware,
- sg350xg-24t firmware,
- sg350xg-2f10 firmware,
- sg350xg-48t firmware,
- sg355-10p firmware,
- sg500-28 firmware,
- sg500-28mpp firmware,
- sg500-28p firmware,
- sg500-52 firmware,
- sg500-52mp firmware,
- sg500-52p firmware,
- sg500x-24 firmware,
- sg500x-24p firmware,
- sg500x-48 firmware,
- sg500x-48p firmware,
- sg500xg-8f8t firmware,
- sg550x-24 firmware,
- sg550x-24mp firmware,
- sg550x-24mpp firmware,
- sg550x-24p firmware,
- sg550x-48 firmware,
- sg550x-48mp firmware,
- sg550x-48p firmware,
- sx550x-12f firmware,
- sx550x-16ft firmware,
- sx550x-24 firmware,
- sx550x-24f firmware,
- sx550x-24ft firmware,
- sx550x-52 firmware
References
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Zero-day Exploit
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: