#VU7291 Buffer overflow in Cisco IOS and Cisco IOS XE


Published: 2017-07-03 | Updated: 2022-03-08

Vulnerability identifier: #VU7291

Vulnerability risk: High

CVSSv3.1: 9.5 [CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:H/RL:O/RC:C]

CVE-ID: CVE-2017-6737

CWE-ID: CWE-120

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
Cisco IOS
Operating systems & Components / Operating system
Cisco IOS XE
Operating systems & Components / Operating system

Vendor: Cisco Systems, Inc

Description
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.

The weakness exists in the Simple Network Management Protocol (SNMP) subsystem due to buffer overflow when handling malicious input. A remote attacker can send specially crafted SNMP packet via IPv4 or IPv6, trigger memory corruption and execute arbitrary code on the target system.

Successful exploitation of the vulnerability results in system compromise.

Mitigation
The vulnerability is addressed in the following versions:
15.7(3.1.4V)OT.

Vulnerable software versions

Cisco IOS: 15.6.3 M1

Cisco IOS XE: 3.16.1aS


External links
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

Yes. This vulnerability is being exploited in the wild.


Latest bulletins with this vulnerability