A vulnerability in the Autonomic Networking Infrastructure (ANI) registrar feature of Cisco IOS Software (possibly 15.2 through 15.6) and Cisco IOS XE Software (possibly 3.7 through 3.18, and 16) could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition. The vulnerability is due to incomplete input validation on certain crafted packets. An attacker could exploit this vulnerability by sending a crafted autonomic network channel discovery packet to a device that has all the following characteristics: (1) running a Cisco IOS Software or Cisco IOS XE Software release that supports the ANI feature; (2) configured as an autonomic registrar; (3) has a whitelist configured. An exploit could allow the attacker to cause the affected device to reload. Note: Autonomic networking should be configured with a whitelist. Do not remove the whitelist as a workaround. Cisco Bug IDs: CSCvc42717.
No CVSS v3.1
Attack Vector Adjacent Network
Attack Complexity Low
Privileges Required None
Scope Changed
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
Access Vector Adjacent Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
AV:A/AC:L/Au:N/C:N/I:N/A:C
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
|
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/96972 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1038064 | |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170320-ani | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: cisco
Published: 2017-03-21T16:00:00
Updated: 2017-07-11T09:57:01
Reserved: 2016-12-21T00:00:00
Link: CVE-2017-3849
JSON object: View
NVD Information
Status : Modified
Published: 2017-03-21T16:59:00.227
Modified: 2017-07-12T01:29:15.630
Link: CVE-2017-3849
JSON object: View
Redhat Information
No data.
CWE