CVE-2017-12278
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco Wireless LAN Controllers could allow an authenticated, remote attacker to cause an affected device to restart, resulting in a denial of service (DoS) condition. The vulnerability is due to a memory leak that occurs on an affected device after the device fails to deallocate a buffer that is used when certain MIBs are polled. An attacker who knows the SNMP Version 2 SNMP Read string or has valid SNMP Version 3 credentials for an affected device could repeatedly poll the affected MIB object IDs (OIDs) and consume available memory on the device. When memory is sufficiently depleted on the device, the device will restart, resulting in a DoS condition. Cisco Bug IDs: CSCvc71674.
Una vulnerabilidad en el subsistema Simple Network Management Protocol (SNMP) de Cisco Wireless LAN Controllers podría permitir que un atacante remoto autenticado provoque que el dispositivo afectado se reinicie, provocando una denegación de servicio (DoS) en consecuencia. La vulnerabilidad se debe a una fuga de memoria que ocurre en un dispositivo afectado después de que el dispositivo falle a la hora de desasignar un búfer que se utiliza cuando algunas MIB están encuestadas. Un atacante que conozca la cadena SNMP Read Versión 2 o tenga credenciales SNMP Versión 3 para un dispositivo afectado podría encuestar repetidamente los ID de los objetos (OID) MIB afectados y consumir la memoria disponible en el dispositivo. Cuando la memoria se agota lo suficiente en el dispositivo, el dispositivo se reiniciará, provocando una denegación de servicio (DoS). Cisco Bug IDs: CSCvc71674.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-08-03 CVE Reserved
- 2017-11-02 CVE Published
- 2023-03-26 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
- CWE-772: Missing Release of Resource after Effective Lifetime
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/101642 | Third Party Advisory | |
http://www.securitytracker.com/id/1039712 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171101-wlc1 | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Wireless Lan Controller Software Search vendor "Cisco" for product "Wireless Lan Controller Software" | - | - |
Affected
| in | Cisco Search vendor "Cisco" | Wireless Lan Controller Search vendor "Cisco" for product "Wireless Lan Controller" | - | - |
Safe
|