Lucene search

K
ciscoCiscoCISCO-SA-20170517-REM1
HistoryMay 17, 2017 - 4:00 p.m.

Cisco Remote Expert Manager Denial of Service Vulnerability

2017-05-1716:00:00
tools.cisco.com
11

0.001 Low

EPSS

Percentile

48.2%

A vulnerability in the TCP connection handling functionality of Cisco Remote Expert Manager Software could allow an unauthenticated, remote attacker to disable TCP ports and cause a denial of service (DoS) condition on an affected system.

The vulnerability is due to a lack of rate-limiting functionality in the TCP Listen application of the affected software. An attacker could exploit this vulnerability by sending a crafted TCP traffic stream in which specific types of TCP packets are flooded to an affected device, for example a TCP packet stream in which the TCP FIN bit is set in all the TCP packets. A successful exploit could allow the attacker to cause certain TCP listening ports on the affected system to stop accepting incoming connections for a period of time or until the affected device is restarted, resulting in a DoS condition. In addition, system resources, such as CPU and memory, could be exhausted during the attack.

There are no workarounds that address this vulnerability.

This advisory is available at the following link:
https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem1 [“https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170517-rem1”]

Affected configurations

Vulners
Node
ciscoremote_expert_managerMatchany
OR
ciscoremote_expert_managerMatchany

0.001 Low

EPSS

Percentile

48.2%

Related for CISCO-SA-20170517-REM1