Denial of service in Cisco Wide Area Application Services - CVE-2017-12267
Published: October 5, 2017
Vulnerability identifier: #VU8705
CSH Severity: Low
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U/U:Clear
CVE-ID: CVE-2017-12267
CWE-ID: CWE-20
Exploitation vector: Remote access
Exploit availability:
No public exploit available
Vendor: Cisco Systems, Inc
Affected software:
Cisco Wide Area Application Services
Cisco Wide Area Application Services
Detailed vulnerability description
The vulnerability allows a remote attacker to cause DoS condition on the target system.
The weakness exists in the Independent Computing Architecture (ICA) accelerator feature for the Cisco Wide Area Application Services (WAAS) due to improper aborting of a connection when an unexpected protocol packet is received. A remote attacker can send a specially crafted ICA traffic and cause an ICA application optimization-related process to restart.
Successful exploitation of the vulnerability results in denial of service.
The weakness exists in the Independent Computing Architecture (ICA) accelerator feature for the Cisco Wide Area Application Services (WAAS) due to improper aborting of a connection when an unexpected protocol packet is received. A remote attacker can send a specially crafted ICA traffic and cause an ICA application optimization-related process to restart.
Successful exploitation of the vulnerability results in denial of service.
How to mitigate CVE-2017-12267
Update to version 6.4(0.14) or 6.2(3d)17.