// For flags

CVE-2017-12299

 

Severity Score

5.3
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability exists in the process of creating default IP blocks during device initialization for Cisco ASA Next-Generation Firewall Services that could allow an unauthenticated, remote attacker to send traffic to the local IP address of the device, bypassing any filters that are configured to deny local IP management traffic. The vulnerability is due to an implementation error that exists in the process of creating default IP blocks when the device is initialized, and the way in which those IP blocks interact with user-configured filters for local IP management traffic (for example, SSH to the device). An attacker could exploit this vulnerability by sending traffic to the local IP address of the targeted device. A successful exploit could allow the attacker to connect to the local IP address of the device even when there are filters configured to deny the traffic. Cisco Bug IDs: CSCvd97962.

Existe una vulnerabilidad en el proceso de creación de bloques de IP por defecto durante la inicialización del dispositivo para Cisco ASA Next-Generation Firewall Services que podría permitir que un atacante remoto no autenticado envíe tráfico a la dirección IP local del dispositivo, omitiendo cualquier filtro que esté configurado para denegar el tráfico de gestión de IP locales. La vulnerabilidad se debe a un error de implementación que existe en el proceso de creación de bloques de IP por defecto cuando se inicializa el dispositivo, así como la manera en la que estos bloques de IP interactúan con filtros configurados por el usuario para el tráfico de gestión de IP locales (por ejemplo, conexiones por SSH al dispositivo). Un atacante podría explotar esta vulnerabilidad enviando tráfico a la dirección IP local del dispositivo objetivo. Un exploit con éxito podría permitir que el atacante se conecte a la dirección IP local del dispositivo incluso cuando hay filtros configurados para denegar el tráfico. Cisco Bug IDs: CSCvd97962.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
Low
Availability
None
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
Partial
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-08-03 CVE Reserved
  • 2017-11-16 CVE Published
  • 2023-09-26 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Firepower Extensible Operating System
Search vendor "Cisco" for product "Firepower Extensible Operating System"
2.2\(1.58\)
Search vendor "Cisco" for product "Firepower Extensible Operating System" and version "2.2\(1.58\)"
-
Affected