First published: Thu Sep 28 2017(Updated: )
A vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco IOS 12.2 through 15.6 could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper parsing of ingress PN-DCP Identify Request packets destined to an affected device. An attacker could exploit this vulnerability by sending a crafted PN-DCP Identify Request packet to an affected device and then continuing to send normal PN-DCP Identify Request packets to the device. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to process PROFINET messages. Beginning with Cisco IOS Software Release 12.2(52)SE, PROFINET is enabled by default on all the base switch module and expansion-unit Ethernet ports. Cisco Bug IDs: CSCuz47179.
Credit: ykramarz@cisco.com ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =12.2\(52\)se | |
Cisco IOS | =12.2\(52\)se1 | |
Cisco IOS | =12.2\(55\)se | |
Cisco IOS | =12.2\(55\)se3 | |
Cisco IOS | =12.2\(55\)se4 | |
Cisco IOS | =12.2\(55\)se5 | |
Cisco IOS | =12.2\(55\)se6 | |
Cisco IOS | =12.2\(55\)se7 | |
Cisco IOS | =12.2\(55\)se9 | |
Cisco IOS | =12.2\(55\)se10 | |
Cisco IOS | =12.2\(55\)se11 | |
Cisco IOS | =12.2\(58\)se | |
Cisco IOS | =12.2\(58\)se1 | |
Cisco IOS | =12.2\(58\)se2 | |
Cisco IOS | =12.4\(25e\)jao3a | |
Cisco IOS | =12.4\(25e\)jao20s | |
Cisco IOS | =12.4\(25e\)jap1n | |
Cisco IOS | =12.4\(25e\)jap9 | |
Cisco IOS | =15.0\(1\)ey | |
Cisco IOS | =15.0\(1\)ey1 | |
Cisco IOS | =15.0\(1\)ey2 | |
Cisco IOS | =15.0\(2\)eb | |
Cisco IOS | =15.0\(2\)ec | |
Cisco IOS | =15.0\(2\)ey | |
Cisco IOS | =15.0\(2\)ey1 | |
Cisco IOS | =15.0\(2\)ey2 | |
Cisco IOS | =15.0\(2\)ey3 | |
Cisco IOS | =15.0\(2\)se | |
Cisco IOS | =15.0\(2\)se1 | |
Cisco IOS | =15.0\(2\)se2 | |
Cisco IOS | =15.0\(2\)se3 | |
Cisco IOS | =15.0\(2\)se4 | |
Cisco IOS | =15.0\(2\)se5 | |
Cisco IOS | =15.0\(2\)se6 | |
Cisco IOS | =15.0\(2\)se7 | |
Cisco IOS | =15.0\(2\)se8 | |
Cisco IOS | =15.0\(2\)se9 | |
Cisco IOS | =15.0\(2\)se10 | |
Cisco IOS | =15.0\(2\)se10a | |
Cisco IOS | =15.0\(2\)sqd7 | |
Cisco IOS | =15.1\(2\)sg7a | |
Cisco IOS | =15.1\(2\)sg9 | |
Cisco IOS | =15.2\(1\)ey | |
Cisco IOS | =15.2\(2\)e | |
Cisco IOS | =15.2\(2\)e1 | |
Cisco IOS | =15.2\(2\)e2 | |
Cisco IOS | =15.2\(2\)e3 | |
Cisco IOS | =15.2\(2\)e4 | |
Cisco IOS | =15.2\(2\)e5 | |
Cisco IOS | =15.2\(2\)e5a | |
Cisco IOS | =15.2\(2\)e5b | |
Cisco IOS | =15.2\(2\)e6 | |
Cisco IOS | =15.2\(2\)eb | |
Cisco IOS | =15.2\(2\)eb1 | |
Cisco IOS | =15.2\(2\)eb2 | |
Cisco IOS | =15.2\(2a\)e2 | |
Cisco IOS | =15.2\(3\)e1 | |
Cisco IOS | =15.2\(3\)e2 | |
Cisco IOS | =15.2\(3\)e3 | |
Cisco IOS | =15.2\(3\)e4 | |
Cisco IOS | =15.2\(3\)e5 | |
Cisco IOS | =15.2\(3\)ex | |
Cisco IOS | =15.2\(4\)ec | |
Cisco IOS | =15.2\(5\)e2a | |
Cisco IOS | =15.2\(5\)e2b | |
Cisco IOS | =15.2\(5a\)e1 | |
Cisco IOS | =15.3\(3\)jbb6a | |
Cisco IOS | =15.3\(3\)jc7 | |
Cisco IOS | =15.3\(3\)jc50 | |
Cisco IOS | =15.3\(3\)jc51 | |
Cisco IOS | =15.3\(3\)jca7 | |
Cisco IOS | =15.3\(3\)jda3 | |
Cisco IOS | =15.3\(3\)je1 | |
Cisco IOS | =15.3\(3\)jnc4 | |
Cisco IOS | =15.3\(3\)jnd2 | |
Cisco IOS | =15.3\(3\)jnp2 | |
Cisco IOS | =15.3\(3\)jpb | |
Cisco IOS | =15.3\(3\)jpb2 | |
Cisco IOS | =15.3\(3\)jpc3 | |
Cisco IOS | =15.4\(3\)s5a | |
Cisco IOS | =15.4\(3\)s6b | |
Cisco IOS | =15.4\(3\)s7a | |
Cisco IOS | =15.5\(3\)s2a | |
Cisco IOS | =15.5\(3\)s2b | |
Cisco IOS | =15.5\(3\)s3a | |
Cisco IOS | =15.5\(3\)s4a | |
Cisco IOS | =15.5\(3\)s4b | |
Cisco IOS | =15.5\(3\)s4d | |
Cisco IOS | =15.6\(1\)s1a | |
Cisco IOS | =15.6\(2\)s0a | |
Cisco IOS | =15.6\(2\)s2 | |
Cisco IOS | =15.6\(2\)s3 | |
Cisco IOS | =15.6\(2\)sp1b | |
Cisco IOS | =15.6\(2\)sp1c | |
Cisco IOS | =15.6\(2\)sp2a | |
Cisco IOS | ||
All of | ||
Cisco IOS | >=12.2<=15.6 | |
Any of | ||
Cisco Industrial Ethernet 2000 16ptc-g-e Switch | ||
Cisco Industrial Ethernet 2000 16ptc-g-l Switch | ||
Cisco Industrial Ethernet 2000 16ptc-g-nx Switch | ||
Cisco IE 2000-16t67 Industrial Ethernet switch | ||
Cisco Industrial Ethernet 2000 16t67p-g-e Switch | ||
Cisco IE 2000-16tc-g-e Industrial Ethernet switch | ||
Cisco Industrial Ethernet 2000 16tc-g-l Switch | ||
Cisco IE 2000-16tc-g-n Industrial Ethernet switch | ||
Cisco IE 2000-16tc-g-x Industrial Ethernet switch | ||
Cisco Industrial Ethernet 2000 16tc-l Switch | ||
Cisco IE 2000-24t67 Industrial Ethernet switch | ||
Cisco Industrial Ethernet 2000 4s-ts-g-b Switch | ||
Cisco Industrial Ethernet 2000 4s-ts-g-l Switch | ||
Cisco Industrial Ethernet 2000 4t-b Switch | ||
Cisco Industrial Ethernet 2000 4t-g-b Switch | ||
Cisco Industrial Ethernet 2000 4t-g-l Switch | ||
Cisco IE 2000-4t Industrial Ethernet switch | ||
Cisco Industrial Ethernet 2000 4ts-b Switch | ||
Cisco Industrial Ethernet 2000 4ts-g-b Switch | ||
Cisco Industrial Ethernet 2000 4ts-g-l Switch | ||
Cisco Industrial Ethernet 2000 4ts-l Switch | ||
Cisco Industrial Ethernet 2000 8t67-b Switch | ||
Cisco Industrial Ethernet 2000 8t67p-g-e Switch | ||
Cisco Industrial Ethernet 2000 8tc-b Switch | ||
Cisco Industrial Ethernet 2000 8tc-g-b Switch | ||
Cisco Industrial Ethernet 2000 8tc-g-e Switch | ||
Cisco Industrial Ethernet 2000 8tc-g-l Switch | ||
Cisco IE 2000-8tc-g-n Industrial Ethernet switch | ||
Cisco Industrial Ethernet 2000 8tc-l Switch | ||
Cisco Industrial Ethernet 2000 Series Firmware | =15.2\(5.4.32i\)e2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.