CVE-2017-6655
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the Fibre Channel over Ethernet (FCoE) protocol implementation in Cisco NX-OS Software could allow an unauthenticated, adjacent attacker to cause a denial of service (DoS) condition when an FCoE-related process unexpectedly reloads. This vulnerability affects Cisco NX-OS Software on the following Cisco devices when they are configured for FCoE: Multilayer Director Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches. More Information: CSCvc91729. Known Affected Releases: 8.3(0)CV(0.833). Known Fixed Releases: 8.3(0)ISH(0.62) 8.3(0)CV(0.944) 8.1(1) 8.1(0.8)S0 7.3(2)D1(0.47).
Una vulnerabilidad en la implementación del protocolo Fibre Channel over Ethernet (FCoE) en el software NX-OS de Cisco, podría permitir a un atacante adyacente no identificado causar una condición de denegación de servicio (DoS) cuando un proceso relacionado con FCoE se recarga inesperadamente. Esta vulnerabilidad afecta al software de NX-OS de Cisco en los siguientes dispositivos Cisco cuando son configurados para FCoE: Multilayer Director Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches. Más información: CSCvc91729. Versiones Afectadas Conocidas: 8.3(0)CV(0.833). Versiones Corregidas Conocidas: 8.3(0)ISH(0.62) 8.3(0)CV(0.944) 8.1(1) 8.1(0.8)S0 7.3(2)D1(0.47).
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-03-09 CVE Reserved
- 2017-06-13 CVE Published
- 2023-03-07 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/98991 | Third Party Advisory | |
http://www.securitytracker.com/id/1038628 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170607-nxos | 2021-12-16 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Mds 9000 Nx-os Search vendor "Cisco" for product "Mds 9000 Nx-os" | 7.3\(1\)d1\(1\) Search vendor "Cisco" for product "Mds 9000 Nx-os" and version "7.3\(1\)d1\(1\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Nx-os For Nexus 5500 Platform Switches Search vendor "Cisco" for product "Nx-os For Nexus 5500 Platform Switches" | 7.3\(1\)n1\(1\) Search vendor "Cisco" for product "Nx-os For Nexus 5500 Platform Switches" and version "7.3\(1\)n1\(1\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Nx-os For Nexus 5600 Platform Switches Search vendor "Cisco" for product "Nx-os For Nexus 5600 Platform Switches" | 7.3\(1\)n1\(1\) Search vendor "Cisco" for product "Nx-os For Nexus 5600 Platform Switches" and version "7.3\(1\)n1\(1\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Nx-os For Nexus 7700 Series Switches Search vendor "Cisco" for product "Nx-os For Nexus 7700 Series Switches" | 8.0\(1\)\(ed\) Search vendor "Cisco" for product "Nx-os For Nexus 7700 Series Switches" and version "8.0\(1\)\(ed\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | 8.0\(1\)s2 Search vendor "Cisco" for product "Nx-os" and version "8.0\(1\)s2" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | 8.3\(0\)cv\(0.833\) Search vendor "Cisco" for product "Nx-os" and version "8.3\(0\)cv\(0.833\)" | - |
Affected
|