First published: Mon May 22 2017(Updated: )
A vulnerability in the TCP throttling process of Cisco UCS C-Series Rack Servers 3.0(0.234) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient rate-limiting protection. An attacker could exploit this vulnerability by sending a high rate of TCP SYN packets to a specific TCP listening port on an affected device. An exploit could allow the attacker to cause a specific TCP listening port to stop accepting new connections, resulting in a DoS condition. Cisco Bug IDs: CSCva65544.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco Unified Computing System software | =3.0\(0.234\) | |
Cisco UCS C220 M4 Rack Server | ||
Cisco UCS C240 M4 | ||
Cisco UCS C3160 | ||
Cisco UCS C460 M4 Rack Server |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-6633 is classified as high, as it could allow an unauthenticated, remote attacker to cause a denial of service.
To fix CVE-2017-6633, it is recommended to update to a version of Cisco UCS C-Series Rack Servers that includes patched software addressing this vulnerability.
CVE-2017-6633 is caused by insufficient rate-limiting protection in the TCP throttling process of affected Cisco UCS C-Series Rack Servers.
Devices using Cisco Unified Computing System software version 3.0(0.234) are affected by CVE-2017-6633.
Yes, CVE-2017-6633 can be exploited remotely by an unauthenticated attacker to trigger a denial of service condition.