CISA KEV 정보
| 취약점명 | Cisco IOS and IOS XE Software DHCP Remote Code Execution Vulnerability |
|---|---|
| 설명 | The Dynamic Host Configuration Protocol (DHCP) relay subsystem of Cisco IOS and Cisco IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system. |
| 조치사항 | Apply updates per vendor instructions. |
| 랜섬웨어 캠페인 악용 | Unknown |
| CWE | CWE-20 |
| 등록일 (KEV) | 2022-03-03 |
| 조치 기한 | 2022-03-24 |
| 추가 참고 | https://nvd.nist.gov/vuln/detail/CVE-2017-12240 |
NVD 상세 정보
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HAV:N/AC:L/Au:N/C:C/I:C/A:C설명: The DHCP relay subsystem of Cisco IOS 12.2 through 15.6 and Cisco IOS XE Software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a buffer overflow condition in the DHCP relay subsystem of the affected software. An attacker could exploit this vulnerability by sending a crafted DHCP Version 4 (DHCPv4) packet to an affected system. A successful exploit could allow the attacker to execute arbitrary code and gain full control of the affected system or cause the affected system to reload, resulting in a DoS condition. Cisco Bug IDs: CSCsm45390, CSCuw77959.
CWE: CWE-20 | CWE-119
참조
- http://www.securityfocus.com/bid/101034 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1039445 [Broken Link, Third Party Advisory, VDB Entry]
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCsm45390 [Vendor Advisory]
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCuw77959 [Vendor Advisory]
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-dhcp [Vendor Advisory]
- http://www.securityfocus.com/bid/101034 [Broken Link, Third Party Advisory, VDB Entry]
- http://www.securitytracker.com/id/1039445 [Broken Link, Third Party Advisory, VDB Entry]
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCsm45390 [Vendor Advisory]
- https://quickview.cloudapps.cisco.com/quickview/bug/CSCuw77959 [Vendor Advisory]
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170927-dhcp [Vendor Advisory]
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-12240
This product uses the NVD API but is not endorsed or certified by the NVD.