Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2017-3849 |
CWE-ID | CWE-20 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
Cisco IOS Operating systems & Components / Operating system Cisco IOS XE Operating systems & Components / Operating system |
Vendor | Cisco Systems, Inc |
Security Bulletin
This security bulletin contains one medium risk vulnerability.
EUVDB-ID: #VU6158
Risk: Medium
CVSSv3.1: 5.7 [CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2017-3849
CWE-ID:
CWE-20 - Improper input validation
Exploit availability: No
DescriptionThe vulnerability allows an unauthenticated, adjacent attacker to cause DoS conditions.
The vulnerability exists in Autonomic Networking Infrastructure (ANI) registrar feature due to incomplete input validation. An attacker can send a specially crafted autonomic network channel discovery packet and cause the affected device to reload.
Successful exploitation of the vulnerability results in denial of service on the vulnerable device.
Install update from vendor's website.
Cisco IOS: 15.2.2 ea - 15.6.2 SP
Cisco IOS XE: 3.7 - 3.18
External linkshttp://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.