First published: Thu Sep 28 2017(Updated: )
A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS 15.0 through 15.4 for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory management issue in the affected software. An attacker could exploit this vulnerability by creating a large number of VPLS-generated MAC entries in the MAC address table of an affected device. A successful exploit could allow the attacker to cause a C6800-16P10G or C6800-16P10G-XL type line card to crash, resulting in a DoS condition. This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces. Cisco Bug IDs: CSCva61927.
Credit: ykramarz@cisco.com psirt@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.0\(1\)sy1 | |
Cisco IOS | =15.1\(1\)sy | |
Cisco IOS | =15.1\(1\)sy1 | |
Cisco IOS | =15.1\(1\)sy2 | |
Cisco IOS | =15.1\(1\)sy3 | |
Cisco IOS | =15.1\(1\)sy4 | |
Cisco IOS | =15.1\(1\)sy5 | |
Cisco IOS | =15.1\(1\)sy6 | |
Cisco IOS | =15.1\(2\)sy | |
Cisco IOS | =15.1\(2\)sy1 | |
Cisco IOS | =15.1\(2\)sy2 | |
Cisco IOS | =15.1\(2\)sy3 | |
Cisco IOS | =15.1\(2\)sy4 | |
Cisco IOS | =15.1\(2\)sy4a | |
Cisco IOS | =15.1\(2\)sy5 | |
Cisco IOS | =15.1\(2\)sy6 | |
Cisco IOS | =15.1\(2\)sy7 | |
Cisco IOS | =15.1\(2\)sy8 | |
Cisco IOS | =15.1\(2\)sy9 | |
Cisco IOS | =15.1\(2\)sy10 | |
Cisco IOS | =15.2\(1\)sy | |
Cisco IOS | =15.2\(1\)sy0a | |
Cisco IOS | =15.2\(1\)sy1 | |
Cisco IOS | =15.2\(1\)sy1a | |
Cisco IOS | =15.2\(1\)sy2 | |
Cisco IOS | =15.2\(1\)sy3 | |
Cisco IOS | =15.2\(1\)sy4 | |
Cisco IOS | =15.2\(2\)sy | |
Cisco IOS | =15.2\(2\)sy1 | |
Cisco IOS | =15.2\(2\)sy2 | |
Cisco IOS | =15.3\(1\)sy | |
Cisco IOS | =15.3\(1\)sy1 | |
Cisco IOS | =15.3\(1\)sy2 | |
Cisco IOS | =15.4\(1\)sy | |
Cisco Catalyst 6800 Series Switches | ||
All of | ||
Cisco IOS | >=15.0<=15.4 | |
Any of | ||
Cisco C6800-16P10G | ||
Cisco Catalyst 6800 Series | ||
Cisco Catalyst 6000 | ||
Cisco Catalyst 6000 | =2.2\(1a\) | |
Cisco Catalyst 6000 | =3.1\(1a\) | |
Cisco Catalyst 6000 ws-svc-nam-2 | =2.2\(1a\) | |
Cisco Catalyst 6000 ws-svc-nam-2 | =3.1\(1a\) | |
Cisco Catalyst 6500 ws-x6380-nam | =2.1\(2\) | |
Cisco Catalyst 6500 ws-x6380-nam | =3.1\(1a\) | |
Cisco Catalyst 6500-E | ||
Cisco Catalyst 6500-E | ||
Cisco Catalyst 6500 Wireless Services Module | =2.2\(1a\) | |
Cisco Catalyst 6500 Wireless Services Module | =3.1\(1a\) | |
Cisco Catalyst 6000 ws-svc-nam-2 | =2.2\(1a\) | |
Cisco Catalyst 6000 ws-svc-nam-2 | =3.1\(1a\) | |
Cisco Catalyst 6500 Series Switches | =2.1\(2\) | |
Cisco Catalyst 6500 Series Switches | =3.1\(1a\) | |
cisco catalyst 6503-e firmware | ||
Cisco Catalyst 6504-E Firmware | ||
Cisco Catalyst 6506-E Firmware | ||
Cisco Catalyst 6509-E Firmware | ||
Cisco Catalyst 6509-NEB-A Firmware | ||
Cisco Catalyst 6509-V-E | ||
Cisco Catalyst 6513 | ||
Cisco Catalyst 6513 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-12238 is classified as a high severity vulnerability due to its potential to cause denial of service.
To fix CVE-2017-12238, upgrade affected Cisco IOS versions to a non-vulnerable release.
CVE-2017-12238 affects Cisco IOS versions 15.0 through 15.4 on the Catalyst 6800 Series Switches.
CVE-2017-12238 cannot be exploited remotely as it requires adjacency to the target network.
CVE-2017-12238 can facilitate a denial of service attack by causing the affected line card to crash.