First published: Tue Mar 21 2017(Updated: )
A vulnerability in the Autonomic Networking Infrastructure (ANI) feature of Cisco IOS Software (15.4 through 15.6) and Cisco IOS XE Software (3.7 through 3.18, and 16) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted IPv6 packet to a device that is running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature. A device must meet two conditions to be affected by this vulnerability: (1) the device must be running a version of Cisco IOS Software or Cisco IOS XE Software that supports ANI (regardless of whether ANI is configured); and (2) the device must have a reachable IPv6 interface. An exploit could allow the attacker to cause the affected device to reload. Cisco Bug IDs: CSCvc42729.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.2\(3\)e | |
Cisco IOS | =15.2\(3\)e1 | |
Cisco IOS | =15.2\(3\)e2 | |
Cisco IOS | =15.2\(3\)e3 | |
Cisco IOS | =15.2\(4\)e | |
Cisco IOS | =15.2\(4\)e1 | |
Cisco IOS | =15.2\(4\)e2 | |
Cisco IOS | =15.2\(5\)e | |
Cisco IOS | =15.2\(5b\)e | |
Cisco IOS | =15.3\(3\)s | |
Cisco IOS | =15.3\(3\)s1 | |
Cisco IOS | =15.3\(3\)s2 | |
Cisco IOS | =15.3\(3\)s3 | |
Cisco IOS | =15.3\(3\)s4 | |
Cisco IOS | =15.3\(3\)s5 | |
Cisco IOS | =15.3\(3\)s6 | |
Cisco IOS | =15.4\(1\)s | |
Cisco IOS | =15.4\(1\)s1 | |
Cisco IOS | =15.4\(1\)s2 | |
Cisco IOS | =15.4\(1\)s3 | |
Cisco IOS | =15.4\(1\)s4 | |
Cisco IOS | =15.4\(2\)s1 | |
Cisco IOS | =15.4\(2\)s2 | |
Cisco IOS | =15.4\(2\)s3 | |
Cisco IOS | =15.4\(2\)s4 | |
Cisco IOS | =15.4\(3\)s | |
Cisco IOS | =15.4\(3\)s1 | |
Cisco IOS | =15.4\(3\)s2 | |
Cisco IOS | =15.4\(3\)s3 | |
Cisco IOS | =15.4\(3\)s4 | |
Cisco IOS | =15.4\(3\)s5 | |
Cisco IOS | =15.4\(3\)s6 | |
Cisco IOS | =15.5\(1\)s | |
Cisco IOS | =15.5\(1\)s1 | |
Cisco IOS | =15.5\(1\)s2 | |
Cisco IOS | =15.5\(1\)s3 | |
Cisco IOS | =15.5\(1\)s4 | |
Cisco IOS | =15.5\(2\)s | |
Cisco IOS | =15.5\(2\)s1 | |
Cisco IOS | =15.5\(2\)s2 | |
Cisco IOS | =15.5\(2\)s3 | |
Cisco IOS | =15.5\(3\)s | |
Cisco IOS | =15.5\(3\)s0a | |
Cisco IOS | =15.5\(3\)s1 | |
Cisco IOS | =15.5\(3\)s1a | |
Cisco IOS | =15.5\(3\)s2 | |
Cisco IOS | =15.5\(3\)s3 | |
Cisco IOS | =15.5\(3\)sn | |
Cisco IOS | =15.6\(1\)s | |
Cisco IOS | =15.6\(1\)s1 | |
Cisco IOS | =15.6\(1\)s2 | |
Cisco IOS | =15.6\(1\)t | |
Cisco IOS | =15.6\(1\)t0a | |
Cisco IOS | =15.6\(1\)t1 | |
Cisco IOS | =15.6\(1\)t2 | |
Cisco IOS | =15.6\(2\)s | |
Cisco IOS | =15.6\(2\)s1 | |
Cisco IOS | =15.6\(2\)sn | |
Cisco IOS | =15.6\(2\)t | |
Cisco IOS | =15.6\(2\)t1 | |
Cisco IOS | =15.6\(2\)t2 | |
Cisco IOS | =15.6\(3\)m | |
Cisco IOS XE Software | =3.7.0e | |
Cisco IOS XE Software | =3.7.1e | |
Cisco IOS XE Software | =3.7.2e | |
Cisco IOS XE Software | =3.7.3e | |
Cisco IOS XE Software | =3.7.4e | |
Cisco IOS XE Software | =3.7.5e | |
Cisco IOS XE Software | =3.8.0e | |
Cisco IOS XE Software | =3.8.1e | |
Cisco IOS XE Software | =3.8.2e | |
Cisco IOS XE Software | =3.8.3e | |
Cisco IOS XE Software | =3.9.0e | |
Cisco IOS XE Software | =3.9.1e | |
Cisco IOS XE Software | =3.10.0s | |
Cisco IOS XE Software | =3.10.1s | |
Cisco IOS XE Software | =3.10.1xbs | |
Cisco IOS XE Software | =3.10.2s | |
Cisco IOS XE Software | =3.10.3s | |
Cisco IOS XE Software | =3.10.4s | |
Cisco IOS XE Software | =3.10.5s | |
Cisco IOS XE Software | =3.10.6s | |
Cisco IOS XE Software | =3.10.7s | |
Cisco IOS XE Software | =3.10.8s | |
Cisco IOS XE Software | =3.11.0s | |
Cisco IOS XE Software | =3.11.1s | |
Cisco IOS XE Software | =3.11.2s | |
Cisco IOS XE Software | =3.11.3s | |
Cisco IOS XE Software | =3.11.4s | |
Cisco IOS XE Software | =3.12.0as | |
Cisco IOS XE Software | =3.12.1s | |
Cisco IOS XE Software | =3.12.2s | |
Cisco IOS XE Software | =3.12.3s | |
Cisco IOS XE Software | =3.12.4s | |
Cisco IOS XE Software | =3.13.0as | |
Cisco IOS XE Software | =3.13.0s | |
Cisco IOS XE Software | =3.13.1s | |
Cisco IOS XE Software | =3.13.2s | |
Cisco IOS XE Software | =3.13.3s | |
Cisco IOS XE Software | =3.13.4s | |
Cisco IOS XE Software | =3.13.5as | |
Cisco IOS XE Software | =3.13.5s | |
Cisco IOS XE Software | =3.13.6as | |
Cisco IOS XE Software | =3.13.6s | |
Cisco IOS XE Software | =3.14.0s | |
Cisco IOS XE Software | =3.14.1s | |
Cisco IOS XE Software | =3.14.2s | |
Cisco IOS XE Software | =3.14.3s | |
Cisco IOS XE Software | =3.14.4s | |
Cisco IOS XE Software | =3.15.0s | |
Cisco IOS XE Software | =3.15.1cs | |
Cisco IOS XE Software | =3.15.1s | |
Cisco IOS XE Software | =3.15.2s | |
Cisco IOS XE Software | =3.15.3s | |
Cisco IOS XE Software | =3.15.4s | |
Cisco IOS XE Software | =3.16.0cs | |
Cisco IOS XE Software | =3.16.0s | |
Cisco IOS XE Software | =3.16.1as | |
Cisco IOS XE Software | =3.16.1s | |
Cisco IOS XE Software | =3.16.2as | |
Cisco IOS XE Software | =3.16.2bs | |
Cisco IOS XE Software | =3.16.2s | |
Cisco IOS XE Software | =3.16.3as | |
Cisco IOS XE Software | =3.16.3s | |
Cisco IOS XE Software | =3.16.4as | |
Cisco IOS XE Software | =3.16.4bs | |
Cisco IOS XE Software | =3.16.4ds | |
Cisco IOS XE Software | =3.16.4s | |
Cisco IOS XE Software | =3.16.5s | |
Cisco IOS XE Software | =3.17.0s | |
Cisco IOS XE Software | =3.17.1as | |
Cisco IOS XE Software | =3.17.1s | |
Cisco IOS XE Software | =3.17.2s | |
Cisco IOS XE Software | =3.17.3s | |
Cisco IOS XE Software | =3.18.0as | |
Cisco IOS XE Software | =3.18.0s | |
Cisco IOS XE Software | =3.18.0sp | |
Cisco IOS XE Software | =3.18.1asp | |
Cisco IOS XE Software | =3.18.1bsp | |
Cisco IOS XE Software | =3.18.1s | |
Cisco IOS XE Software | =3.18.1sp | |
Cisco IOS XE Software | =3.18.2s | |
Cisco IOS XE Software | =3.18.3vs |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3850 has a CVSS score that indicates a high severity level due to its potential to cause a denial of service.
To remediate CVE-2017-3850, upgrade to a fixed version of Cisco IOS Software or IOS XE Software as specified in Cisco's advisory.
CVE-2017-3850 affects multiple versions of Cisco IOS and Cisco IOS XE, particularly those from version 15.4 to 15.6, and several 3.x versions of IOS XE.
Yes, CVE-2017-3850 can be exploited by an unauthenticated remote attacker, leading to a denial of service condition.
If immediate updates cannot be applied for CVE-2017-3850, consider isolating affected devices from the network or implementing strict access controls.