ID

VAR-201704-1343


CVE

CVE-2017-6606


TITLE

Cisco IOS XE Vulnerability to execute arbitrary command in software startup script

Trust: 0.8

sources: JVNDB: JVNDB-2017-003060

DESCRIPTION

A vulnerability in a startup script of Cisco IOS XE Software could allow an unauthenticated attacker with physical access to the targeted system to execute arbitrary commands on the underlying operating system with the privileges of the root user. More Information: CSCuz06639 CSCuz42122. Known Affected Releases: 15.6(1.1)S 16.1.2 16.2.0 15.2(1)E. Known Fixed Releases: Denali-16.1.3 16.2(1.8) 16.1(2.61) 15.6(2)SP 15.6(2)S1 15.6(1)S2 15.5(3)S3a 15.5(3)S3 15.5(2)S4 15.5(1)S4 15.4(3)S6a 15.4(3)S6 15.3(3)S8a 15.3(3)S8 15.2(5)E 15.2(4)E3 15.2(3)E5 15.0(2)SQD3 15.0(1.9.2)SQD3 3.9(0)E. Cisco IOS is the interconnected network operating system used on most Cisco system routers and network switches. Cisco IOS XE Software is prone to a local command-execution vulnerability. A local attacker can exploit this issue to execute arbitrary commands within the context of the application. This issue is being tracked by Cisco Bug ID's CSCuz06639 and CSCuz42122. The vulnerability is caused by the program's insufficient validation of the value of the ROMMON variable

Trust: 2.52

sources: NVD: CVE-2017-6606 // JVNDB: JVNDB-2017-003060 // CNVD: CNVD-2017-04872 // BID: 97434 // VULHUB: VHN-114809

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-04872

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.1.0sg

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.15.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.13.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.5.0sq

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.6.4e

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2.5sg

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.8.1s

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.2.8sg

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.7.0e

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.3.1se

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:3.4.8sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.1xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.3sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.2e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.2sq

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.2ae

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.3e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.2sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.4e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.1.2

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.3e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.3sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.5se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.2ts

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.0sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.1xbs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.2e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.0xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.5e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.0sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.5as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0sq

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.2sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.7s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.2e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.6s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.0bs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.18.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.1sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.5sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.1as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.1.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.1sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.1se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.7s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.2bs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.1sq

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.1xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.3se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.3e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.1as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.6s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.9sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.0sq

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.0se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.0cs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.7sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.4as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.2ts

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.1sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.6sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.5ae

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.4sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.2as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.1sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.1sq

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.3se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.2xo

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.2se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.6e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.4se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.7sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.0e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.2se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.4sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.9.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.16.2as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.2sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.11.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.10sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.6sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.2.11sg

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.8.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.1cs

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.3.0se

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.1e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.5s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.15.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.10.1s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.13.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.1sq

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.14.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.5.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.1.4s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.3s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:16.2.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.7.6s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.17.0s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.4.0as

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.7e

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.6.2s

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:3.12.3s

Trust: 1.0

vendor:ciscomodel:iosscope:eqversion:16.2

Trust: 0.9

vendor:ciscomodel:iosscope:eqversion:16.1.2

Trust: 0.9

vendor:ciscomodel:ios 15.6 sscope: - version: -

Trust: 0.9

vendor:ciscomodel:ios 15.2 escope: - version: -

Trust: 0.9

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

sources: CNVD: CNVD-2017-04872 // BID: 97434 // JVNDB: JVNDB-2017-003060 // CNNVD: CNNVD-201704-425 // NVD: CVE-2017-6606

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6606
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-6606
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2017-04872
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201704-425
value: MEDIUM

Trust: 0.6

VULHUB: VHN-114809
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6606
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-04872
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-114809
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6606
baseSeverity: MEDIUM
baseScore: 6.4
vectorString: CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.5
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-04872 // VULHUB: VHN-114809 // JVNDB: JVNDB-2017-003060 // CNNVD: CNNVD-201704-425 // NVD: CVE-2017-6606

PROBLEMTYPE DATA

problemtype:CWE-78

Trust: 1.9

sources: VULHUB: VHN-114809 // JVNDB: JVNDB-2017-003060 // NVD: CVE-2017-6606

THREAT TYPE

local

Trust: 0.9

sources: BID: 97434 // CNNVD: CNNVD-201704-425

TYPE

operating system commend injection

Trust: 0.6

sources: CNNVD: CNNVD-201704-425

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-003060

PATCH

title:cisco-sa-20170405-iosxeurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170405-iosxe

Trust: 0.8

title:Cisco IOSXE Software Local Command Execution Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/92084

Trust: 0.6

title:Cisco IOS XE Software Fixes for command injection vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=69158

Trust: 0.6

sources: CNVD: CNVD-2017-04872 // JVNDB: JVNDB-2017-003060 // CNNVD: CNNVD-201704-425

EXTERNAL IDS

db:NVDid:CVE-2017-6606

Trust: 3.4

db:BIDid:97434

Trust: 2.0

db:SECTRACKid:1038190

Trust: 1.1

db:JVNDBid:JVNDB-2017-003060

Trust: 0.8

db:CNNVDid:CNNVD-201704-425

Trust: 0.7

db:CNVDid:CNVD-2017-04872

Trust: 0.6

db:NSFOCUSid:36305

Trust: 0.6

db:VULHUBid:VHN-114809

Trust: 0.1

sources: CNVD: CNVD-2017-04872 // VULHUB: VHN-114809 // BID: 97434 // JVNDB: JVNDB-2017-003060 // CNNVD: CNNVD-201704-425 // NVD: CVE-2017-6606

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170405-iosxe

Trust: 2.0

url:http://www.securityfocus.com/bid/97434

Trust: 1.7

url:http://www.securitytracker.com/id/1038190

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6606

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-6606

Trust: 0.8

url:http://www.nsfocus.net/vulndb/36305

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2017-04872 // VULHUB: VHN-114809 // BID: 97434 // JVNDB: JVNDB-2017-003060 // CNNVD: CNNVD-201704-425 // NVD: CVE-2017-6606

CREDITS

Cisco.

Trust: 0.3

sources: BID: 97434

SOURCES

db:CNVDid:CNVD-2017-04872
db:VULHUBid:VHN-114809
db:BIDid:97434
db:JVNDBid:JVNDB-2017-003060
db:CNNVDid:CNNVD-201704-425
db:NVDid:CVE-2017-6606

LAST UPDATE DATE

2024-11-23T23:02:29.383000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-04872date:2017-04-21T00:00:00
db:VULHUBid:VHN-114809date:2017-07-12T00:00:00
db:BIDid:97434date:2017-04-11T00:03:00
db:JVNDBid:JVNDB-2017-003060date:2017-05-12T00:00:00
db:CNNVDid:CNNVD-201704-425date:2017-04-11T00:00:00
db:NVDid:CVE-2017-6606date:2024-11-21T03:30:06.363

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-04872date:2017-04-20T00:00:00
db:VULHUBid:VHN-114809date:2017-04-07T00:00:00
db:BIDid:97434date:2017-04-05T00:00:00
db:JVNDBid:JVNDB-2017-003060date:2017-05-12T00:00:00
db:CNNVDid:CNNVD-201704-425date:2017-04-11T00:00:00
db:NVDid:CVE-2017-6606date:2017-04-07T17:59:00.777