CVE-2017-6628
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in SMART-SSL Accelerator functionality for Cisco Wide Area Application Services (WAAS) 6.2.1, 6.2.1a, and 6.2.3a could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition where the WAN optimization could stop functioning while the process restarts. The vulnerability is due to a Secure Sockets Layer/Transport Layer Security (SSL/TLS) alert being incorrectly handled when in a specific SSL/TLS connection state. An attacker could exploit this vulnerability by establishing a SMART-SSL connection through the targeted device. The attacker would then send a crafted stream of SSL/TLS traffic. An exploit could allow the attacker to cause a DoS condition where WAN optimization could stop processing traffic for a short period of time. Cisco Bug IDs: CSCvb71133.
Una vulnerabilidad en la funcionalidad de SMART-SSL Accelerator de Cisco Cisco Wide Area Application Services (WAAS) 6.2.1, 6.2.1a y 6.2.3a podría permitir a un atacante remoto no autenticado causar una denegación de servicio (DoS) provocando que la WAN deje de funcionar mientras el proceso se reinicia. La vulnerabilidad se debe a que una alerta de Secure Sockets Layer/Transport Layer Security (SSL/TLS) manejada incorrectamente cuando se encuentra en un estado de conexión SSL / TLS específica. Un atacante podría explotar esta vulnerabilidad al establecer una conexión SMART-SSL a través del dispositivo de destino. El atacante entonces enviaría una secuencia de tráfico SSL / TLS. Un exploit podría permitir al atacante causar un DoS en la que la WAN que podría detener el procesamiento del tráfico durante un corto período de tiempo. ID de errores de Cisco: CSCvb71133.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-03-09 CVE Reserved
- 2017-05-03 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-399: Resource Management Errors
- CWE-755: Improper Handling of Exceptional Conditions
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/98294 | Third Party Advisory | |
http://www.securitytracker.com/id/1038399 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170503-waas | 2019-10-03 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Wide Area Application Services Search vendor "Cisco" for product "Wide Area Application Services" | 6.2.1 Search vendor "Cisco" for product "Wide Area Application Services" and version "6.2.1" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Wide Area Application Services Search vendor "Cisco" for product "Wide Area Application Services" | 6.2.1a Search vendor "Cisco" for product "Wide Area Application Services" and version "6.2.1a" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Wide Area Application Services Search vendor "Cisco" for product "Wide Area Application Services" | 6.2.3a Search vendor "Cisco" for product "Wide Area Application Services" and version "6.2.3a" | - |
Affected
|