// For flags

CVE-2017-6628

 

Severity Score

6.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in SMART-SSL Accelerator functionality for Cisco Wide Area Application Services (WAAS) 6.2.1, 6.2.1a, and 6.2.3a could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition where the WAN optimization could stop functioning while the process restarts. The vulnerability is due to a Secure Sockets Layer/Transport Layer Security (SSL/TLS) alert being incorrectly handled when in a specific SSL/TLS connection state. An attacker could exploit this vulnerability by establishing a SMART-SSL connection through the targeted device. The attacker would then send a crafted stream of SSL/TLS traffic. An exploit could allow the attacker to cause a DoS condition where WAN optimization could stop processing traffic for a short period of time. Cisco Bug IDs: CSCvb71133.

Una vulnerabilidad en la funcionalidad de SMART-SSL Accelerator de Cisco Cisco Wide Area Application Services (WAAS) 6.2.1, 6.2.1a y 6.2.3a podría permitir a un atacante remoto no autenticado causar una denegación de servicio (DoS) provocando que la WAN deje de funcionar mientras el proceso se reinicia. La vulnerabilidad se debe a que una alerta de Secure Sockets Layer/Transport Layer Security (SSL/TLS) manejada incorrectamente cuando se encuentra en un estado de conexión SSL / TLS específica. Un atacante podría explotar esta vulnerabilidad al establecer una conexión SMART-SSL a través del dispositivo de destino. El atacante entonces enviaría una secuencia de tráfico SSL / TLS. Un exploit podría permitir al atacante causar un DoS en la que la WAN que podría detener el procesamiento del tráfico durante un corto período de tiempo. ID de errores de Cisco: CSCvb71133.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
High
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-03-09 CVE Reserved
  • 2017-05-03 CVE Published
  • 2023-03-07 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-399: Resource Management Errors
  • CWE-755: Improper Handling of Exceptional Conditions
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Wide Area Application Services
Search vendor "Cisco" for product "Wide Area Application Services"
6.2.1
Search vendor "Cisco" for product "Wide Area Application Services" and version "6.2.1"
-
Affected
Cisco
Search vendor "Cisco"
Wide Area Application Services
Search vendor "Cisco" for product "Wide Area Application Services"
6.2.1a
Search vendor "Cisco" for product "Wide Area Application Services" and version "6.2.1a"
-
Affected
Cisco
Search vendor "Cisco"
Wide Area Application Services
Search vendor "Cisco" for product "Wide Area Application Services"
6.2.3a
Search vendor "Cisco" for product "Wide Area Application Services" and version "6.2.3a"
-
Affected