Denial of service in Cisco Catalyst 6800 Series Switches - CVE-2017-12238

 

Denial of service in Cisco Catalyst 6800 Series Switches - CVE-2017-12238

Published: September 27, 2017 / Updated: March 8, 2022


Vulnerability identifier: #VU8611
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:A/U:Clear
CVE-ID: CVE-2017-12238
CWE-ID: CWE-399
Exploitation vector: Adjecent network
Exploit availability: The vulnerability is being exploited in the wild
Vendor: Cisco Systems, Inc
Affected software:
Cisco Catalyst 6800 Series Switches

Detailed vulnerability description

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to a memory management issue when processing MAC entries. A remote attacker with access to local network can create a large number of VPLS-generated MAC entries in the MAC address table of an affected device and cause a C6800-16P10G or C6800-16P10G-XL type line card to crash.

Successful exploitation of the vulnerability may allow an attacker to perform a denial of service (DoS) attack against affected device.

This vulnerability affects Cisco Catalyst 6800 Series Switches that are running a vulnerable release of Cisco IOS Software and have a Cisco C6800-16P10G or C6800-16P10G-XL line card in use with Supervisor Engine 6T. To be vulnerable, the device must also be configured with VPLS and the C6800-16P10G or C6800-16P10G-XL line card needs to be the core-facing MPLS interfaces.


How to mitigate CVE-2017-12238

Update to version 15.4(1)IA1.144.

Sources