ID

VAR-201707-0917


CVE

CVE-2017-6672


TITLE

Cisco ASR 5000 Vulnerability related to access control in Aggregation Service Router

Trust: 0.8

sources: JVNDB: JVNDB-2017-006830

DESCRIPTION

A vulnerability in certain filtering mechanisms of access control lists (ACLs) for Cisco ASR 5000 Series Aggregation Services Routers through 21.x could allow an unauthenticated, remote attacker to bypass ACL rules that have been configured for an affected device. More Information: CSCvb99022 CSCvc16964 CSCvc37351 CSCvc54843 CSCvc63444 CSCvc77815 CSCvc88658 CSCve08955 CSCve14141 CSCve33870. Vendors have confirmed this vulnerability Bug ID CSCvb99022 , CSCvc16964 , CSCvc37351 , CSCvc54843 , CSCvc63444 , CSCvc77815 , CSCvc88658 , CSCve08955 , CSCve14141 ,and CSCve33870 It is released as.Information may be tampered with. Cisco ASR5000 Series AggregationServicesRouters is the ASR5000 series of multi-function routers from Cisco. Successfully exploiting this issue may allow an attacker to bypass certain security restrictions and perform unauthorized actions. This issue is being tracked by Cisco Bug ID's CSCvb99022, CSCvc16964, CSCvc37351, CSCvc54843, CSCvc63444, CSCvc77815, CSCvc88658, CSCve08955, CSCve14141 and CSCve33870. Access control lists (ACLs) is one of the access control list components. The vulnerability stems from the fact that the program does not detect and match specific traffic

Trust: 2.52

sources: NVD: CVE-2017-6672 // JVNDB: JVNDB-2017-006830 // CNVD: CNVD-2017-26112 // BID: 99921 // VULHUB: VHN-114875

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2017-26112

AFFECTED PRODUCTS

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.2.a0.65995

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.1.0

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.3.1

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.1.m0.65931

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.1.m0.65710

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.2.a0.65914

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.0.v1.66638

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:19.6.6

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.1.m0.65986

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.1.m0.65921

Trust: 1.6

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.1.v0

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.2.12

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.3.0

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.0.v2

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.3.0

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.1.v5

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:19.3.5

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:19.6.3

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:20.2.4

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:19.3.12

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:19.6.0

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:21.1.2

Trust: 1.0

vendor:ciscomodel:asr 5000 series softwarescope:eqversion:19.3.11

Trust: 1.0

vendor:ciscomodel:asr seriesscope:eqversion:50000

Trust: 0.9

vendor:ciscomodel:asr 5000 series softwarescope:lteversion:21.x

Trust: 0.8

sources: CNVD: CNVD-2017-26112 // BID: 99921 // JVNDB: JVNDB-2017-006830 // CNNVD: CNNVD-201707-1177 // NVD: CVE-2017-6672

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-6672
value: HIGH

Trust: 1.0

NVD: CVE-2017-6672
value: HIGH

Trust: 0.8

CNVD: CNVD-2017-26112
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201707-1177
value: HIGH

Trust: 0.6

VULHUB: VHN-114875
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-6672
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2017-26112
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-114875
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:N/I:P/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-6672
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2017-26112 // VULHUB: VHN-114875 // JVNDB: JVNDB-2017-006830 // CNNVD: CNNVD-201707-1177 // NVD: CVE-2017-6672

PROBLEMTYPE DATA

problemtype:CWE-863

Trust: 1.1

problemtype:CWE-284

Trust: 0.9

sources: VULHUB: VHN-114875 // JVNDB: JVNDB-2017-006830 // NVD: CVE-2017-6672

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201707-1177

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201707-1177

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-006830

PATCH

title:cisco-sa-20170719-asr1url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170719-asr1

Trust: 0.8

title:Cisco ASR5000 Series AggregationServices Router Rules Bypass Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/101876

Trust: 0.6

title:Cisco ASR 5000 Series Aggregation Services Repair measures for router security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=72022

Trust: 0.6

sources: CNVD: CNVD-2017-26112 // JVNDB: JVNDB-2017-006830 // CNNVD: CNNVD-201707-1177

EXTERNAL IDS

db:NVDid:CVE-2017-6672

Trust: 3.4

db:BIDid:99921

Trust: 2.6

db:SECTRACKid:1038962

Trust: 1.7

db:JVNDBid:JVNDB-2017-006830

Trust: 0.8

db:CNNVDid:CNNVD-201707-1177

Trust: 0.7

db:CNVDid:CNVD-2017-26112

Trust: 0.6

db:VULHUBid:VHN-114875

Trust: 0.1

sources: CNVD: CNVD-2017-26112 // VULHUB: VHN-114875 // BID: 99921 // JVNDB: JVNDB-2017-006830 // CNNVD: CNNVD-201707-1177 // NVD: CVE-2017-6672

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170719-asr1

Trust: 2.0

url:http://www.securityfocus.com/bid/99921

Trust: 1.7

url:http://www.securitytracker.com/id/1038962

Trust: 1.7

url:https://nvd.nist.gov/vuln/detail/cve-2017-6672

Trust: 1.4

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-6672

Trust: 0.8

url:http://www.cisco.com/en/us/products/ps11072/

Trust: 0.3

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2017-26112 // VULHUB: VHN-114875 // BID: 99921 // JVNDB: JVNDB-2017-006830 // CNNVD: CNNVD-201707-1177 // NVD: CVE-2017-6672

CREDITS

Cisco

Trust: 0.9

sources: BID: 99921 // CNNVD: CNNVD-201707-1177

SOURCES

db:CNVDid:CNVD-2017-26112
db:VULHUBid:VHN-114875
db:BIDid:99921
db:JVNDBid:JVNDB-2017-006830
db:CNNVDid:CNNVD-201707-1177
db:NVDid:CVE-2017-6672

LAST UPDATE DATE

2024-11-23T22:59:16.902000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2017-26112date:2017-09-11T00:00:00
db:VULHUBid:VHN-114875date:2019-10-03T00:00:00
db:BIDid:99921date:2017-07-19T00:00:00
db:JVNDBid:JVNDB-2017-006830date:2017-09-05T00:00:00
db:CNNVDid:CNNVD-201707-1177date:2019-10-23T00:00:00
db:NVDid:CVE-2017-6672date:2024-11-21T03:30:16.560

SOURCES RELEASE DATE

db:CNVDid:CNVD-2017-26112date:2017-09-11T00:00:00
db:VULHUBid:VHN-114875date:2017-07-25T00:00:00
db:BIDid:99921date:2017-07-19T00:00:00
db:JVNDBid:JVNDB-2017-006830date:2017-09-05T00:00:00
db:CNNVDid:CNNVD-201707-1177date:2017-07-27T00:00:00
db:NVDid:CVE-2017-6672date:2017-07-25T19:29:00.207