ID

VAR-201709-0709


CVE

CVE-2017-12231


TITLE

Cisco IOS Resource management vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2017-008500

DESCRIPTION

A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper translation of H.323 messages that use the Registration, Admission, and Status (RAS) protocol and are sent to an affected device via IPv4 packets. An attacker could exploit this vulnerability by sending a crafted H.323 RAS packet through an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to use an application layer gateway with NAT (NAT ALG) for H.323 RAS messages. By default, a NAT ALG is enabled for H.323 RAS messages. Cisco Bug IDs: CSCvc57217. Cisco IOS Contains a resource management vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvc57217 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOS is an operating system developed by Cisco in the United States for its network equipment

Trust: 2.07

sources: NVD: CVE-2017-12231 // JVNDB: JVNDB-2017-008500 // BID: 101039 // VULHUB: VHN-102733 // VULMON: CVE-2017-12231

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:lteversion:15.6

Trust: 1.0

vendor:ciscomodel:iosscope:gteversion:12.4

Trust: 1.0

vendor:ciscomodel:iosscope: - version: -

Trust: 0.8

vendor:ciscomodel:iosscope:eqversion:15.1\(2\)sg7a

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.4\(25e\)jap9

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.4\(25e\)jap1n

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\(4\)ec

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.0\(2\)sqd7

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.4\(25e\)jao20s

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:12.4\(25e\)jao3a

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)e5b

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\(3\)ex

Trust: 0.6

vendor:ciscomodel:iosscope:eqversion:15.2\(2\)e3

Trust: 0.6

vendor:ciscomodel:ios softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 15.6 m0ascope: - version: -

Trust: 0.3

sources: BID: 101039 // JVNDB: JVNDB-2017-008500 // CNNVD: CNNVD-201709-1303 // NVD: CVE-2017-12231

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12231
value: HIGH

Trust: 1.0

NVD: CVE-2017-12231
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201709-1303
value: HIGH

Trust: 0.6

VULHUB: VHN-102733
value: HIGH

Trust: 0.1

VULMON: CVE-2017-12231
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-12231
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-102733
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12231
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.1

Trust: 1.0

NVD: CVE-2017-12231
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-102733 // VULMON: CVE-2017-12231 // JVNDB: JVNDB-2017-008500 // CNNVD: CNNVD-201709-1303 // NVD: CVE-2017-12231

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: VULHUB: VHN-102733 // JVNDB: JVNDB-2017-008500 // NVD: CVE-2017-12231

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201709-1303

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201709-1303

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-008500

PATCH

title:cisco-sa-20170927-naturl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-nat

Trust: 0.8

title:Cisco IOS Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75188

Trust: 0.6

title:Cisco: Cisco IOS Software Network Address Translation Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20170927-nat

Trust: 0.1

title:Known Exploited Vulnerabilities Detectorurl:https://github.com/Ostorlab/KEV

Trust: 0.1

sources: VULMON: CVE-2017-12231 // JVNDB: JVNDB-2017-008500 // CNNVD: CNNVD-201709-1303

EXTERNAL IDS

db:NVDid:CVE-2017-12231

Trust: 2.9

db:BIDid:101039

Trust: 2.1

db:SECTRACKid:1039449

Trust: 1.8

db:JVNDBid:JVNDB-2017-008500

Trust: 0.8

db:CNNVDid:CNNVD-201709-1303

Trust: 0.7

db:VULHUBid:VHN-102733

Trust: 0.1

db:VULMONid:CVE-2017-12231

Trust: 0.1

sources: VULHUB: VHN-102733 // VULMON: CVE-2017-12231 // BID: 101039 // JVNDB: JVNDB-2017-008500 // CNNVD: CNNVD-201709-1303 // NVD: CVE-2017-12231

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170927-nat

Trust: 2.2

url:http://www.securityfocus.com/bid/101039

Trust: 1.9

url:http://www.securitytracker.com/id/1039449

Trust: 1.8

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12231

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12231

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/ostorlab/kev

Trust: 0.1

sources: VULHUB: VHN-102733 // VULMON: CVE-2017-12231 // BID: 101039 // JVNDB: JVNDB-2017-008500 // CNNVD: CNNVD-201709-1303 // NVD: CVE-2017-12231

CREDITS

Cisco

Trust: 0.3

sources: BID: 101039

SOURCES

db:VULHUBid:VHN-102733
db:VULMONid:CVE-2017-12231
db:BIDid:101039
db:JVNDBid:JVNDB-2017-008500
db:CNNVDid:CNNVD-201709-1303
db:NVDid:CVE-2017-12231

LAST UPDATE DATE

2024-11-23T22:48:55.225000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-102733date:2019-10-09T00:00:00
db:VULMONid:CVE-2017-12231date:2019-10-09T00:00:00
db:BIDid:101039date:2017-09-27T00:00:00
db:JVNDBid:JVNDB-2017-008500date:2017-10-20T00:00:00
db:CNNVDid:CNNVD-201709-1303date:2019-10-17T00:00:00
db:NVDid:CVE-2017-12231date:2024-11-21T03:09:05.157

SOURCES RELEASE DATE

db:VULHUBid:VHN-102733date:2017-09-29T00:00:00
db:VULMONid:CVE-2017-12231date:2017-09-29T00:00:00
db:BIDid:101039date:2017-09-27T00:00:00
db:JVNDBid:JVNDB-2017-008500date:2017-10-20T00:00:00
db:CNNVDid:CNNVD-201709-1303date:2017-09-28T00:00:00
db:NVDid:CVE-2017-12231date:2017-09-29T01:34:48.747