ID

VAR-201703-0906


CVE

CVE-2017-3853


TITLE

Cisco IOx Buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-002699

DESCRIPTION

A vulnerability in the Data-in-Motion (DMo) process installed with the Cisco IOx application environment could allow an unauthenticated, remote attacker to cause a stack overflow that could allow remote code execution with root privileges in the virtual instance running on an affected device. The vulnerability is due to insufficient bounds checking in the DMo process. An attacker could exploit this vulnerability by sending crafted packets that are forwarded to the DMo process for evaluation. The impacts of a successful exploit are limited to the scope of the virtual instance and do not impact the router that is hosting Cisco IOx. This vulnerability affects the following Cisco 800 Series Industrial Integrated Services Routers: Cisco IR809 and Cisco IR829. Cisco IOx Releases 1.0.0.0 and 1.1.0.0 are vulnerable. Cisco Bug IDs: CSCuy52330. Cisco IOx Contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCuy52330 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) An attack may be carried out. A stack buffer overflow vulnerability exists in several Cisco products due to insufficient boundary checking before copying user data to a buffer of insufficient size. Data-in-Motion (DMo) is one of the real-time data interaction processes. The DMo process installed with the Cisco IOx 1.0.0.0 and 1.1.0.0 application environment has a security vulnerability. Failed exploit attempts will likely cause a denial-of-service condition. There are no workarounds that address this vulnerability. This advisory is available at the following link: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-iox ["https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-iox"] -----BEGIN PGP SIGNATURE----- iQKBBAEBAgBrBQJY0qMqZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHnAgQ/9E53gx3RzJorkoUhK ncGbIGWeBmDJJqyU7lgAvZDCbJKZTTYaLcz8IhiGH/DEonfEoPlRf5YIoHdEDbTV 8eE8sBnNXqVjSJatVvdLZWilZthTrgT8aQgX+t6PWOrbbERXf8XYUYX7wz2/IkEq j2x4IR9ZpgJVVazFJFuC2D/Sz6j9LB65xEbUe6d3K6ZLbCAYrm9AHA6+nTrQqPTL enfW/RhD1ciu6m5y0sOg0VE68C8pDJV/a8BPtVk3Rz22oesWVkpZPRSJXzk1M6H7 35a8EHozoqZen3Ojb27bgVlIG+scyyJDZzgmpz7+l1A6h5Uq1UL/sss2foiz0Te3 UOM79CSBSzR6woF+3qFBDwumNGhjHdlrfg8t+XDzhSh3+BQ5zNUijZB4+X7f/R+8 SdYAtHiSGXDg9RR9GTeRKCyjl7RqwJ9IMMmR1qyJSkI41UL20CPdt9mK0ajlzzhD qMh0iMZtlvjoxjhix5lXpXXpIDb2iwCQcHma76Cq32MkKL8HOXfJq7rpZPH8p6tH An9VjssLWjiMWnO1nhtP+i+zYEmp9U/jK2VVw1t4Fzv8HfdscWr3RLrSxyJOjQO9 SvN++XAo0ERp8TcMeV8skCqeV+JgzUAZ3JlKODR/R//lJPQLfuqfJoTPOxabROuy Uxj5oDgf6UpOaZOli8Av//fSiE8= =Lr/s -----END PGP SIGNATURE-----

Trust: 3.24

sources: NVD: CVE-2017-3853 // JVNDB: JVNDB-2017-002699 // CNVD: CNVD-2017-04002 // CNNVD: CNNVD-201703-992 // BID: 97011 // VULHUB: VHN-112056 // VULMON: CVE-2017-3853 // PACKETSTORM: 141771

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-04002

AFFECTED PRODUCTS

vendor:ciscomodel:ioxscope:eqversion:1.1.0

Trust: 1.6

vendor:ciscomodel:ioxscope:eqversion:1.1\(0\)

Trust: 1.6

vendor:ciscomodel:ioxscope:eqversion:1.0.0.0

Trust: 0.8

vendor:ciscomodel:ioxscope:eqversion:1.1.0.0

Trust: 0.8

vendor:ciscomodel:ioxscope:ltversion:1.1.0

Trust: 0.6

vendor:ciscomodel:ir829scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ir809scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:iox softwarescope:eqversion:1.1.0.0

Trust: 0.3

vendor:ciscomodel:iox softwarescope:eqversion:1.0.0.0

Trust: 0.3

sources: CNVD: CNVD-2017-04002 // BID: 97011 // JVNDB: JVNDB-2017-002699 // CNNVD: CNNVD-201703-992 // NVD: CVE-2017-3853

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-3853
value: CRITICAL

Trust: 1.0

NVD: CVE-2017-3853
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2017-04002
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201703-992
value: CRITICAL

Trust: 0.6

VULHUB: VHN-112056
value: HIGH

Trust: 0.1

VULMON: CVE-2017-3853
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-3853
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2017-04002
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-112056
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-3853
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-04002 // VULHUB: VHN-112056 // VULMON: CVE-2017-3853 // JVNDB: JVNDB-2017-002699 // CNNVD: CNNVD-201703-992 // NVD: CVE-2017-3853

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-112056 // JVNDB: JVNDB-2017-002699 // NVD: CVE-2017-3853

THREAT TYPE

remote

Trust: 0.7

sources: PACKETSTORM: 141771 // CNNVD: CNNVD-201703-992

TYPE

buffer overflow

Trust: 0.6

sources: CNNVD: CNNVD-201703-992

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-002699

EXPLOIT AVAILABILITY

sources: VULHUB: VHN-112056

PATCH

title:cisco-sa-20170322-ioxurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-iox

Trust: 0.8

title:Patch for multiple Cisco product stack buffer overflow vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/91529

Trust: 0.6

title:Cisco IOx Data-in-Motion Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=68703

Trust: 0.6

title:Threatposturl:https://threatpost.com/cisco-patches-critical-iox-vulnerability/124533/

Trust: 0.1

sources: CNVD: CNVD-2017-04002 // VULMON: CVE-2017-3853 // JVNDB: JVNDB-2017-002699 // CNNVD: CNNVD-201703-992

EXTERNAL IDS

db:NVDid:CVE-2017-3853

Trust: 3.6

db:BIDid:97011

Trust: 2.1

db:SECTRACKid:1038105

Trust: 1.2

db:JVNDBid:JVNDB-2017-002699

Trust: 0.8

db:CNNVDid:CNNVD-201703-992

Trust: 0.7

db:CNVDid:CNVD-2017-04002

Trust: 0.6

db:PACKETSTORMid:141771

Trust: 0.2

db:VULHUBid:VHN-112056

Trust: 0.1

db:VULMONid:CVE-2017-3853

Trust: 0.1

sources: CNVD: CNVD-2017-04002 // VULHUB: VHN-112056 // VULMON: CVE-2017-3853 // BID: 97011 // JVNDB: JVNDB-2017-002699 // PACKETSTORM: 141771 // CNNVD: CNNVD-201703-992 // NVD: CVE-2017-3853

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170322-iox

Trust: 2.2

url:http://www.securityfocus.com/bid/97011

Trust: 1.9

url:https://nvd.nist.gov/vuln/detail/cve-2017-3853

Trust: 1.5

url:http://www.securitytracker.com/id/1038105

Trust: 1.2

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-3853

Trust: 0.8

url:https://threatpost.com/cisco-patches-critical-iox-vulnerability/124533/

Trust: 0.7

url:http://seclists.org/bugtraq/2017/mar/82

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170322-iox"]

Trust: 0.1

sources: CNVD: CNVD-2017-04002 // VULHUB: VHN-112056 // VULMON: CVE-2017-3853 // BID: 97011 // JVNDB: JVNDB-2017-002699 // PACKETSTORM: 141771 // CNNVD: CNNVD-201703-992 // NVD: CVE-2017-3853

CREDITS

Cisco.

Trust: 0.3

sources: BID: 97011

SOURCES

db:CNVDid:CNVD-2017-04002
db:VULHUBid:VHN-112056
db:VULMONid:CVE-2017-3853
db:BIDid:97011
db:JVNDBid:JVNDB-2017-002699
db:PACKETSTORMid:141771
db:CNNVDid:CNNVD-201703-992
db:NVDid:CVE-2017-3853

LAST UPDATE DATE

2024-11-23T23:05:28.745000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-04002date:2017-04-06T00:00:00
db:VULHUBid:VHN-112056date:2017-07-12T00:00:00
db:VULMONid:CVE-2017-3853date:2017-07-12T00:00:00
db:BIDid:97011date:2017-03-23T00:01:00
db:JVNDBid:JVNDB-2017-002699date:2017-04-25T00:00:00
db:CNNVDid:CNNVD-201703-992date:2017-03-23T00:00:00
db:NVDid:CVE-2017-3853date:2024-11-21T03:26:14.820

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-04002date:2017-04-06T00:00:00
db:VULHUBid:VHN-112056date:2017-03-22T00:00:00
db:VULMONid:CVE-2017-3853date:2017-03-22T00:00:00
db:BIDid:97011date:2017-03-22T00:00:00
db:JVNDBid:JVNDB-2017-002699date:2017-04-25T00:00:00
db:PACKETSTORMid:141771date:2017-03-22T17:27:00
db:CNNVDid:CNNVD-201703-992date:2017-03-23T00:00:00
db:NVDid:CVE-2017-3853date:2017-03-22T19:59:00.247