// For flags

CVE-2017-3876

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the Event Management Service daemon (emsd) of Cisco IOS XR routers could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on the affected device. The vulnerability is due to improper handling of gRPC requests. An attacker could exploit this vulnerability by repeatedly sending unauthenticated gRPC requests to the affected device. A successful exploit could allow the attacker to crash the device in such a manner that manual intervention is required to recover. This vulnerability affects all Cisco IOS XR platforms that are running release 6.1.1 of Cisco IOS XR Software when the gRPC service is enabled on the device. The gRPC service is not enabled by default. Cisco Bug IDs: CSCvb14441.

Una vulnerabilidad en el demonio Event Management Service (emsd) de los routers IOS XR de Cisco, podría permitir a un atacante remoto no autenticado causar una condición de denegación de servicio (DoS) en el dispositivo afectado. La vulnerabilidad es debido a un manejo inapropiado de las peticiones gRPC. Un atacante podría explotar esta vulnerabilidad mediante el envío repetitivo de peticiones gRPC no autenticadas hacia el dispositivo afectado. Una explotación con éxito podría permitir al atacante bloquear el dispositivo de tal manera que se requiera la intervención manual para recuperarse. Esta vulnerabilidad afecta a todas las Plataformas de IOS XR de Cisco que están ejecutando la versión 6.1.1 del software IOS XR de Cisco cuando el servicio gRPC esta habilitado en el dispositivo. El servicio gRPC no está habilitado por defecto. ID de bug de Cisco: CSCvb14441.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-12-21 CVE Reserved
  • 2017-05-16 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-399: Resource Management Errors
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
6.1.0
Search vendor "Cisco" for product "Ios Xr" and version "6.1.0"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xr
Search vendor "Cisco" for product "Ios Xr"
6.1.1
Search vendor "Cisco" for product "Ios Xr" and version "6.1.1"
-
Affected