You are here
Home > Preporuke > Ranjivost CIP značajke u Cisco IOS softveru

Ranjivost CIP značajke u Cisco IOS softveru

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: CIS

—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1

Cisco Security Advisory: Cisco IOS Software Common Industrial Protocol Request Denial of Service Vulnerabilities

Advisory ID: cisco-sa-20170927-cip

Revision: 1.0

For Public Release: 2017 September 27 16:00 GMT

Last Updated: 2017 September 27 16:00 GMT

CVE ID(s): CVE-2017-12233, CVE-2017-12234

CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

+———————————————————————

Summary
=======
Multiple vulnerabilities in the implementation of the Common Industrial Protocol (CIP) feature in Cisco IOS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition.

The vulnerabilities are due to the improper parsing of crafted CIP packets destined to an affected device. An attacker could exploit these vulnerabilities by sending crafted CIP packets to be processed by an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition.

Cisco has released software updates that address these vulnerabilities. There are no workarounds that address these vulnerabilities.

This advisory is available at the following link:
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip [“https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-cip”]

This advisory is part of the September 27, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes 12 Cisco Security Advisories that describe 13 vulnerabilities. For a complete list of the advisories and links to them, see Cisco Event Response: September 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [“https://tools.cisco.com/security/center/viewErp.x?alertId=ERP-63410”].

—–BEGIN PGP SIGNATURE—–
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=NLyv
—–END PGP SIGNATURE—–

_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com

AutorDanijel Kozinovic
Cert idNCERT-REF-2017-09-0085-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost Cisco bežičnog kontrolera u grafičkom korisničkom sučelju

Otkrivena je ranjivost u bežičnom kontroleru grafičkog korisničkog sučelja (web-based Wireless Controller GUI) u Cisco IOS XE softveru za Cisco...

Close