First published: Thu Apr 20 2017(Updated: )
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS XE 3.16 could allow an authenticated, remote attacker to cause a denial of service (DoS) condition. The vulnerability is due to a race condition that could occur when the affected software processes an SNMP read request that contains certain criteria for a specific object ID (OID) and an active crypto session is disconnected on an affected device. An attacker who can authenticate to an affected device could trigger this vulnerability by issuing an SNMP request for a specific OID on the device. A successful exploit will cause the device to restart due to an attempt to access an invalid memory region. The attacker does not control how or when crypto sessions are disconnected on the device. Cisco Bug IDs: CSCvb94392.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS XE Web UI | =3.16.0cs | |
Cisco IOS XE Web UI | =3.16.0s | |
Cisco IOS XE Web UI | =3.16.1as | |
Cisco IOS XE Web UI | =3.16.1s | |
Cisco IOS XE Web UI | =3.16.2s |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6615 is classified as a high severity vulnerability due to its potential to cause a denial of service (DoS) condition.
To mitigate CVE-2017-6615, users should upgrade to a patched version of Cisco IOS XE that addresses this vulnerability.
CVE-2017-6615 affects Cisco devices running IOS XE versions 3.16.0cs, 3.16.0s, 3.16.1as, 3.16.1s, and 3.16.2s.
No, CVE-2017-6615 requires that the attacker be an authenticated user to exploit the vulnerability.
CVE-2017-6615 can result in a denial of service, making affected systems unresponsive to legitimate network traffic.