Cisco IOS Software VPLS denial of service (cisco-sa-20170927-vpls)

medium Nessus Plugin ID 103672

Synopsis

The remote device is missing a vendor-supplied security patch.

Description

According to its self-reported version and configuration, the Cisco IOS software running on the remote device is affected by a denial of service vulnerability in the Virtual Private LAN Service (VPLS) feature. An unauthenticated, remote attacker can exploit this, via specially crafted requests, to cause the switch to stop processing traffic, requiring a device restart to regain functionality.

Solution

Upgrade to the relevant fixed version referenced in Cisco bug ID CSCva61927.

See Also

http://www.nessus.org/u?7982d6f3

Plugin Details

Severity: Medium

ID: 103672

File Name: cisco-sa-20170927-vpls.nasl

Version: 1.13

Type: combined

Family: CISCO

Published: 10/5/2017

Updated: 4/25/2023

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.1

CVSS v2

Risk Factor: Low

Base Score: 3.3

Temporal Score: 2.7

Vector: CVSS2#AV:A/AC:L/Au:N/C:N/I:N/A:P

CVSS Score Source: CVE-2017-12238

CVSS v3

Risk Factor: Medium

Base Score: 6.5

Temporal Score: 6

Vector: CVSS:3.0/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version, Host/Cisco/IOS/Model

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 9/27/2017

Vulnerability Publication Date: 9/27/2017

CISA Known Exploited Vulnerability Due Dates: 3/24/2022

Reference Information

CVE: CVE-2017-12238

BID: 101040

CISCO-SA: cisco-sa-20170927-vpls

CISCO-BUG-ID: CSCva61927