First published: Mon Aug 07 2017(Updated: )
A vulnerability in the Autonomic Networking feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to reset the Autonomic Control Plane (ACP) of an affected system and view ACP packets that are transferred in clear text within an affected system, an Information Disclosure Vulnerability. More Information: CSCvd51214. Known Affected Releases: Denali-16.2.1 Denali-16.3.1.
Credit: ykramarz@cisco.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cisco IOS | =15.2\(3\)e | |
Cisco IOS | =15.2\(3\)e1 | |
Cisco IOS | =15.2\(3\)e2 | |
Cisco IOS | =15.2\(3\)e3 | |
Cisco IOS | =15.2\(3\)e4 | |
Cisco IOS | =15.2\(3\)e5 | |
Cisco IOS | =15.2\(3a\)e | |
Cisco IOS | =15.2\(3a\)e1 | |
Cisco IOS | =15.2\(3m\)e2 | |
Cisco IOS | =15.2\(3m\)e3 | |
Cisco IOS | =15.2\(3m\)e6 | |
Cisco IOS | =15.2\(3m\)e8 | |
Cisco IOS | =15.2\(4\)e | |
Cisco IOS | =15.2\(4\)e1 | |
Cisco IOS | =15.2\(4\)e2 | |
Cisco IOS | =15.2\(4\)e3 | |
Cisco IOS | =15.2\(5\)e | |
Cisco IOS | =15.2\(5\)e1 | |
Cisco IOS | =15.2\(5a\)e | |
Cisco IOS | =15.2\(5b\)e | |
Cisco IOS | =15.3\(3\)s | |
Cisco IOS | =15.3\(3\)s1 | |
Cisco IOS | =15.3\(3\)s1a | |
Cisco IOS | =15.3\(3\)s2 | |
Cisco IOS | =15.3\(3\)s3 | |
Cisco IOS | =15.3\(3\)s4 | |
Cisco IOS | =15.3\(3\)s5 | |
Cisco IOS | =15.3\(3\)s6 | |
Cisco IOS | =15.3\(3\)s7 | |
Cisco IOS | =15.3\(3\)s8 | |
Cisco IOS | =15.3\(3\)s8a | |
Cisco IOS | =15.3\(3\)s9 | |
Cisco IOS | =15.3\(3\)s10 | |
Cisco IOS | =15.4\(1\)s | |
Cisco IOS | =15.4\(1\)s1 | |
Cisco IOS | =15.4\(1\)s2 | |
Cisco IOS | =15.4\(1\)s3 | |
Cisco IOS | =15.4\(1\)s4 | |
Cisco IOS | =15.4\(2\)s | |
Cisco IOS | =15.4\(2\)s1 | |
Cisco IOS | =15.4\(2\)s2 | |
Cisco IOS | =15.4\(2\)s3 | |
Cisco IOS | =15.4\(2\)s4 | |
Cisco IOS | =15.4\(3\)s | |
Cisco IOS | =15.4\(3\)s1 | |
Cisco IOS | =15.4\(3\)s2 | |
Cisco IOS | =15.4\(3\)s3 | |
Cisco IOS | =15.4\(3\)s4 | |
Cisco IOS | =15.4\(3\)s5 | |
Cisco IOS | =15.4\(3\)s5a | |
Cisco IOS | =15.4\(3\)s6 | |
Cisco IOS | =15.4\(3\)s6a | |
Cisco IOS | =15.4\(3\)s6b | |
Cisco IOS | =15.4\(3\)s7 | |
Cisco IOS | =15.4\(3\)s7a | |
Cisco IOS | =15.4\(3\)s8 | |
Cisco IOS | =15.5\(1\)s | |
Cisco IOS | =15.5\(1\)s1 | |
Cisco IOS | =15.5\(1\)s2 | |
Cisco IOS | =15.5\(1\)s3 | |
Cisco IOS | =15.5\(1\)s4 | |
Cisco IOS | =15.5\(2\)s | |
Cisco IOS | =15.5\(2\)s1 | |
Cisco IOS | =15.5\(2\)s2 | |
Cisco IOS | =15.5\(2\)s3 | |
Cisco IOS | =15.5\(2\)s4 | |
Cisco IOS | =15.5\(3\)s | |
Cisco IOS | =15.5\(3\)s0a | |
Cisco IOS | =15.5\(3\)s1 | |
Cisco IOS | =15.5\(3\)s1a | |
Cisco IOS | =15.5\(3\)s2 | |
Cisco IOS | =15.5\(3\)s2a | |
Cisco IOS | =15.5\(3\)s2b | |
Cisco IOS | =15.5\(3\)s3 | |
Cisco IOS | =15.5\(3\)s3a | |
Cisco IOS | =15.5\(3\)s4 | |
Cisco IOS | =15.5\(3\)s4a | |
Cisco IOS | =15.5\(3\)s4b | |
Cisco IOS | =15.5\(3\)s4d | |
Cisco IOS | =15.5\(3\)s5 | |
Cisco IOS | =15.5\(3\)sn | |
Cisco IOS | =15.6\(1\)s | |
Cisco IOS | =15.6\(1\)s1 | |
Cisco IOS | =15.6\(1\)s1a | |
Cisco IOS | =15.6\(1\)s2 | |
Cisco IOS | =15.6\(1\)s3 | |
Cisco IOS | =15.6\(1\)s4 | |
Cisco IOS | =15.6\(1\)t | |
Cisco IOS | =15.6\(1\)t0a | |
Cisco IOS | =15.6\(1\)t1 | |
Cisco IOS | =15.6\(1\)t2 | |
Cisco IOS | =15.6\(2\)s | |
Cisco IOS | =15.6\(2\)s0a | |
Cisco IOS | =15.6\(2\)s1 | |
Cisco IOS | =15.6\(2\)s2 | |
Cisco IOS | =15.6\(2\)s3 | |
Cisco IOS | =15.6\(2\)s4 | |
Cisco IOS | =15.6\(2\)sn | |
Cisco IOS | =15.6\(2\)sp | |
Cisco IOS | =15.6\(2\)sp1 | |
Cisco IOS | =15.6\(2\)sp1b | |
Cisco IOS | =15.6\(2\)sp1c | |
Cisco IOS | =15.6\(2\)sp2 | |
Cisco IOS | =15.6\(2\)sp2a | |
Cisco IOS | =15.6\(2\)sp3 | |
Cisco IOS | =15.6\(2\)t | |
Cisco IOS | =15.6\(2\)t1 | |
Cisco IOS | =15.6\(2\)t2 | |
Cisco IOS | =15.6\(2\)t3 | |
Cisco IOS | =15.6\(3\)m | |
Cisco IOS | =15.6\(3\)m0a | |
Cisco IOS | =15.6\(3\)m1 | |
Cisco IOS | =15.6\(3\)m1b | |
Cisco IOS | =15.6\(3\)m2 | |
Cisco IOS | =15.6\(3\)m2a | |
Cisco IOS | =15.6\(3\)m3 | |
Cisco IOS | =15.7\(3\)m | |
Cisco IOS XE Software | =3.7.0e | |
Cisco IOS XE Software | =3.7.1e | |
Cisco IOS XE Software | =3.7.3e | |
Cisco IOS XE Software | =3.8.0e | |
Cisco IOS XE Software | =3.8.0ex | |
Cisco IOS XE Software | =3.8.1e | |
Cisco IOS XE Software | =3.8.2e | |
Cisco IOS XE Software | =3.8.3e | |
Cisco IOS XE Software | =3.9.0e | |
Cisco IOS XE Software | =3.9.1e | |
Cisco IOS XE Software | =3.10.4s | |
Cisco IOS XE Software | =3.10.8as | |
Cisco IOS XE Software | =3.10.8s | |
Cisco IOS XE Software | =3.11.3s | |
Cisco IOS XE Software | =3.11.4s | |
Cisco IOS XE Software | =3.12.0as | |
Cisco IOS XE Software | =3.12.0s | |
Cisco IOS XE Software | =3.12.1s | |
Cisco IOS XE Software | =3.12.2s | |
Cisco IOS XE Software | =3.12.3s | |
Cisco IOS XE Software | =3.12.4s | |
Cisco IOS XE Software | =3.13.0s | |
Cisco IOS XE Software | =3.13.1s | |
Cisco IOS XE Software | =3.13.2as | |
Cisco IOS XE Software | =3.13.2s | |
Cisco IOS XE Software | =3.13.4s | |
Cisco IOS XE Software | =3.13.5as | |
Cisco IOS XE Software | =3.13.5s | |
Cisco IOS XE Software | =3.13.6as | |
Cisco IOS XE Software | =3.13.6s | |
Cisco IOS XE Software | =3.13.7as | |
Cisco IOS XE Software | =3.13.8s | |
Cisco IOS XE Software | =3.14.0s | |
Cisco IOS XE Software | =3.14.1s | |
Cisco IOS XE Software | =3.14.2s | |
Cisco IOS XE Software | =3.14.3s | |
Cisco IOS XE Software | =3.14.4s | |
Cisco IOS XE Software | =3.15.0s | |
Cisco IOS XE Software | =3.15.1s | |
Cisco IOS XE Software | =3.15.2s | |
Cisco IOS XE Software | =3.15.3s | |
Cisco IOS XE Software | =3.15.4s | |
Cisco IOS XE Software | =3.16.0s | |
Cisco IOS XE Software | =3.16.1as | |
Cisco IOS XE Software | =3.16.2as | |
Cisco IOS XE Software | =3.16.2s | |
Cisco IOS XE Software | =3.16.3as | |
Cisco IOS XE Software | =3.16.3s | |
Cisco IOS XE Software | =3.16.4as | |
Cisco IOS XE Software | =3.16.4ds | |
Cisco IOS XE Software | =3.16.4s | |
Cisco IOS XE Software | =3.16.6s | |
Cisco IOS XE Software | =3.17.0s | |
Cisco IOS XE Software | =3.17.1as | |
Cisco IOS XE Software | =3.17.1s | |
Cisco IOS XE Software | =3.17.3s | |
Cisco IOS XE Software | =3.17.4s | |
Cisco IOS XE Software | =3.18.0as | |
Cisco IOS XE Software | =3.18.0s | |
Cisco IOS XE Software | =3.18.0sp | |
Cisco IOS XE Software | =3.18.1bsp | |
Cisco IOS XE Software | =3.18.1s | |
Cisco IOS XE Software | =3.18.1sp | |
Cisco IOS XE Software | =3.18.2asp | |
Cisco IOS XE Software | =3.18.2s | |
Cisco IOS XE Software | =3.18.2sp | |
Cisco IOS XE Software | =3.18.3s | |
Cisco IOS XE Software | =3.18.3sp | |
Cisco IOS XE Software | =16.5.1c | |
Cisco IOS XE Software | =16.6.1 | |
Cisco IOS XE Software |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-6665 has a severity rating of high due to the potential for unauthorized access and disruption of the autonomous control plane.
To mitigate CVE-2017-6665, upgrade to the patched Cisco IOS or Cisco IOS XE software versions as recommended in Cisco's security advisory.
CVE-2017-6665 affects multiple versions of Cisco IOS and Cisco IOS XE software, specifically versions mentioned in the advisory.
No, CVE-2017-6665 requires an unauthenticated, adjacent attacker to exploit the vulnerability.
Exploitation of CVE-2017-6665 could allow attackers to view sensitive ACP packets in clear text and reset the affected control plane.