ID

VAR-201703-0899


CVE

CVE-2017-3857


TITLE

Cisco IOS and Cisco IOS XE of Layer 2 Tunneling Protocol Resource parsing vulnerability in the syntax analysis function

Trust: 0.8

sources: JVNDB: JVNDB-2017-002735

DESCRIPTION

A vulnerability in the Layer 2 Tunneling Protocol (L2TP) parsing function of Cisco IOS (12.0 through 12.4 and 15.0 through 15.6) and Cisco IOS XE (3.1 through 3.18) could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to insufficient validation of L2TP packets. An attacker could exploit this vulnerability by sending a crafted L2TP packet to an affected device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition. This vulnerability affects Cisco devices that are running a vulnerable release of Cisco IOS or Cisco IOS XE Software if the L2TP feature is enabled for the device and the device is configured as an L2TP Version 2 (L2TPv2) or L2TP Version 3 (L2TPv3) endpoint. By default, the L2TP feature is not enabled. Cisco Bug IDs: CSCuy82078. Vendors have confirmed this vulnerability Bug ID CSCuy82078 It is released as.Service operation interruption (DoS) An attack may be carried out. Cisco IOSXESoftware is an operating system developed by Cisco Systems for its network devices. Cisco IOSXESoftware failed to adequately filter L2TP packets. Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability. All the vulnerabilities have a Security Impact Rating of High. -----BEGIN PGP SIGNATURE----- iQKBBAEBAgBrBQJY0qKqZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHmEgxAAshBFiyt/hGUC3/it JEYnR1a1Rspaba1kBbMQCgrfPK4hMaZwAykJzkaTSQMSo78SQ3+ddb4tVDk0bSk6 8+WEKFApGC8K6iZkIrUMl2rCX+0A3km42j/IN6bUysuzj+wmj5CQauEgQ8+mgzBn DP5IUyKKaITH83/I2Esin1tsEMcwxVpOUnrjYQVrD4TRLIxp75GsLrF1LnLjPaXk PfU8IEk4OlU/CSePErbYo6Kp3C3spzmIOy6znkikHhlRAhzNcBLTuccY/ZmeFARK JdaWelXdf94GCWBb1iEi3vON/L/ISgDcR5NfOJ43ocot2oGriEq0+qXpabuWQJxI gGZpeITgPPZ8YaY+KK/yymNuag3/lwYn39cgiy7yqVlz54U8dz3Hp9KrB2o3/8+n HwyiRBCnZ81iXiy+2oZnosjOpKBnnlnkKhu9l8exxzqpUjRW2aagRzFqIhu7ZTsX V/BRMaqlBw1thXZlJGUxIomwocXb8f4OrCLh4G57h6749lPeDb/qH4GMriWLO1g4 byCaaHuJ9qpkUYnOcpYaPjre2moC+sHaZZeEP13A9dgHBD3Ue21eiSiSRgnvRd5e 624gJhBHRixDs6n3/ePHJ+jjDYhtBOMjIT7gKueeMocKosLqOrjMUwTPaOajCnoy lx3ZL8eV6WFSukbbuVDiimYbaM0= =LLYg -----END PGP SIGNATURE-----

Trust: 2.7

sources: NVD: CVE-2017-3857 // JVNDB: JVNDB-2017-002735 // CNVD: CNVD-2017-04004 // BID: 97010 // VULHUB: VHN-112060 // VULMON: CVE-2017-3857 // PACKETSTORM: 141769

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-04004

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:lteversion:15.6

Trust: 1.0

vendor:ciscomodel:iosscope:lteversion:12.4

Trust: 1.0

vendor:ciscomodel:ios xescope:lteversion:3.18.0

Trust: 1.0

vendor:ciscomodel:iosscope:gteversion:12.0

Trust: 1.0

vendor:ciscomodel:ios xescope:gteversion:3.1.0

Trust: 1.0

vendor:ciscomodel:iosscope:gteversion:15.0

Trust: 1.0

vendor:ciscomodel:iosscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:ios >12.0 s <12.2 scg1scope: - version: -

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)mrb4

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)mrb2

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)mrb1

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)mrb

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)mrb3

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)mrb6

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\(1\)s

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.2\(33\)scf5

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)s4

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.4\(15\)t1

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios softwarescope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2017-04004 // BID: 97010 // JVNDB: JVNDB-2017-002735 // CNNVD: CNNVD-201703-990 // NVD: CVE-2017-3857

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-3857
value: HIGH

Trust: 1.0

NVD: CVE-2017-3857
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-04004
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201703-990
value: HIGH

Trust: 0.6

VULHUB: VHN-112060
value: HIGH

Trust: 0.1

VULMON: CVE-2017-3857
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-3857
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-04004
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-112060
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-3857
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2017-3857
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2017-04004 // VULHUB: VHN-112060 // VULMON: CVE-2017-3857 // JVNDB: JVNDB-2017-002735 // CNNVD: CNNVD-201703-990 // NVD: CVE-2017-3857

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

problemtype:CWE-400

Trust: 1.1

problemtype:CWE-20

Trust: 0.1

sources: VULHUB: VHN-112060 // JVNDB: JVNDB-2017-002735 // NVD: CVE-2017-3857

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 141769 // CNNVD: CNNVD-201703-990

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201703-990

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002735

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-112060

PATCH

title:cisco-sa-20170322-l2tpurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-l2tp

Trust: 0.8

title:Patch for Cisco IOSXESoftware L2TP Packet Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/91531

Trust: 0.6

title:Cisco IOS and IOS XE Software Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68701

Trust: 0.6

title:Threatposturl:https://threatpost.com/cisco-patches-critical-iox-vulnerability/124533/

Trust: 0.1

sources: CNVD: CNVD-2017-04004 // VULMON: CVE-2017-3857 // JVNDB: JVNDB-2017-002735 // CNNVD: CNNVD-201703-990

EXTERNAL IDS

db:NVDid:CVE-2017-3857

Trust: 3.6

db:BIDid:97010

Trust: 2.7

db:SECTRACKid:1038100

Trust: 1.8

db:JVNDBid:JVNDB-2017-002735

Trust: 0.8

db:CNNVDid:CNNVD-201703-990

Trust: 0.7

db:CNVDid:CNVD-2017-04004

Trust: 0.6

db:PACKETSTORMid:141769

Trust: 0.2

db:VULHUBid:VHN-112060

Trust: 0.1

db:VULMONid:CVE-2017-3857

Trust: 0.1

sources: CNVD: CNVD-2017-04004 // VULHUB: VHN-112060 // VULMON: CVE-2017-3857 // BID: 97010 // JVNDB: JVNDB-2017-002735 // PACKETSTORM: 141769 // CNNVD: CNNVD-201703-990 // NVD: CVE-2017-3857

REFERENCES

url:http://www.securityfocus.com/bid/97010

Trust: 2.4

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170322-l2tp

Trust: 2.2

url:http://www.securitytracker.com/id/1038100

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-3857

Trust: 1.5

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3857

Trust: 0.8

url:http://seclists.org/bugtraq/2017/mar/80

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/en/us/products/sw/iosswrel/products_ios_cisco_ios_software_category_home.html

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/400.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/cisco-sa-20170322-l2tp

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://threatpost.com/cisco-patches-critical-iox-vulnerability/124533/

Trust: 0.1

url:http://tools.cisco.com/security/center/viewerp.x?alertid=erp-60851"].

Trust: 0.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170322-l2tp"]

Trust: 0.1

sources: CNVD: CNVD-2017-04004 // VULHUB: VHN-112060 // VULMON: CVE-2017-3857 // BID: 97010 // JVNDB: JVNDB-2017-002735 // PACKETSTORM: 141769 // CNNVD: CNNVD-201703-990 // NVD: CVE-2017-3857

CREDITS

Cisco

Trust: 0.3

sources: BID: 97010

SOURCES

db:CNVDid:CNVD-2017-04004
db:VULHUBid:VHN-112060
db:VULMONid:CVE-2017-3857
db:BIDid:97010
db:JVNDBid:JVNDB-2017-002735
db:PACKETSTORMid:141769
db:CNNVDid:CNNVD-201703-990
db:NVDid:CVE-2017-3857

LAST UPDATE DATE

2024-11-23T22:38:36.576000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-04004date:2017-04-06T00:00:00
db:VULHUBid:VHN-112060date:2020-07-27T00:00:00
db:VULMONid:CVE-2017-3857date:2020-07-27T00:00:00
db:BIDid:97010date:2017-03-23T00:01:00
db:JVNDBid:JVNDB-2017-002735date:2017-04-26T00:00:00
db:CNNVDid:CNNVD-201703-990date:2020-07-28T00:00:00
db:NVDid:CVE-2017-3857date:2024-11-21T03:26:15.210

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-04004date:2017-04-06T00:00:00
db:VULHUBid:VHN-112060date:2017-03-22T00:00:00
db:VULMONid:CVE-2017-3857date:2017-03-22T00:00:00
db:BIDid:97010date:2017-03-22T00:00:00
db:JVNDBid:JVNDB-2017-002735date:2017-04-26T00:00:00
db:PACKETSTORMid:141769date:2017-03-22T17:24:00
db:CNNVDid:CNNVD-201703-990date:2017-03-23T00:00:00
db:NVDid:CVE-2017-3857date:2017-03-22T19:59:00.307