Lucene search

K
cve[email protected]CVE-2017-12231
HistorySep 29, 2017 - 1:34 a.m.

CVE-2017-12231

2017-09-2901:34:48
CWE-399
web.nvd.nist.gov
843
In Wild
cisco
ios
vulnerability
nat
denial of service
remote attacker
cisco bug ids
cve-2017-12231

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

72.4%

A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper translation of H.323 messages that use the Registration, Admission, and Status (RAS) protocol and are sent to an affected device via IPv4 packets. An attacker could exploit this vulnerability by sending a crafted H.323 RAS packet through an affected device. A successful exploit could allow the attacker to cause the affected device to crash and reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to use an application layer gateway with NAT (NAT ALG) for H.323 RAS messages. By default, a NAT ALG is enabled for H.323 RAS messages. Cisco Bug IDs: CSCvc57217.

Affected configurations

NVD
Node
ciscoiosMatch12.4\(25e\)jao3a
OR
ciscoiosMatch12.4\(25e\)jao20s
OR
ciscoiosMatch12.4\(25e\)jap1n
OR
ciscoiosMatch12.4\(25e\)jap9
OR
ciscoiosMatch15.0\(2\)sqd7
OR
ciscoiosMatch15.1\(2\)sg7a
OR
ciscoiosMatch15.2\(2\)e3
OR
ciscoiosMatch15.2\(2\)e5b
OR
ciscoiosMatch15.2\(3\)ex
OR
ciscoiosMatch15.2\(4\)ec
OR
ciscoiosMatch15.2\(4\)m8
OR
ciscoiosMatch15.2\(4\)m9
OR
ciscoiosMatch15.2\(4\)m10
OR
ciscoiosMatch15.2\(4\)m11
OR
ciscoiosMatch15.2\(4\)s7
OR
ciscoiosMatch15.2\(5\)e2a
OR
ciscoiosMatch15.2\(5\)e2b
OR
ciscoiosMatch15.2\(5a\)e1
OR
ciscoiosMatch15.3\(3\)jbb6a
OR
ciscoiosMatch15.3\(3\)jc7
OR
ciscoiosMatch15.3\(3\)jc50
OR
ciscoiosMatch15.3\(3\)jc51
OR
ciscoiosMatch15.3\(3\)jca7
OR
ciscoiosMatch15.3\(3\)jd7
OR
ciscoiosMatch15.3\(3\)jda3
OR
ciscoiosMatch15.3\(3\)je1
OR
ciscoiosMatch15.3\(3\)jf1
OR
ciscoiosMatch15.3\(3\)jnc4
OR
ciscoiosMatch15.3\(3\)jnd2
OR
ciscoiosMatch15.3\(3\)jnp2
OR
ciscoiosMatch15.3\(3\)jnp4
OR
ciscoiosMatch15.3\(3\)jpb
OR
ciscoiosMatch15.3\(3\)jpb2
OR
ciscoiosMatch15.3\(3\)jpc3
OR
ciscoiosMatch15.3\(3\)m6
OR
ciscoiosMatch15.3\(3\)m7
OR
ciscoiosMatch15.3\(3\)m8
OR
ciscoiosMatch15.3\(3\)m8a
OR
ciscoiosMatch15.3\(3\)s6
OR
ciscoiosMatch15.3\(3\)s7
OR
ciscoiosMatch15.3\(3\)s8
OR
ciscoiosMatch15.3\(3\)s8a
OR
ciscoiosMatch15.3\(3\)s9
OR
ciscoiosMatch15.4\(1\)s4
OR
ciscoiosMatch15.4\(1\)t4
OR
ciscoiosMatch15.4\(2\)s4
OR
ciscoiosMatch15.4\(2\)t4
OR
ciscoiosMatch15.4\(3\)m3
OR
ciscoiosMatch15.4\(3\)m4
OR
ciscoiosMatch15.4\(3\)m5
OR
ciscoiosMatch15.4\(3\)m6
OR
ciscoiosMatch15.4\(3\)m6a
OR
ciscoiosMatch15.4\(3\)s3
OR
ciscoiosMatch15.4\(3\)s4
OR
ciscoiosMatch15.4\(3\)s5
OR
ciscoiosMatch15.4\(3\)s5a
OR
ciscoiosMatch15.4\(3\)s6
OR
ciscoiosMatch15.4\(3\)s6a
OR
ciscoiosMatch15.4\(3\)s6b
OR
ciscoiosMatch15.4\(3\)s7
OR
ciscoiosMatch15.4\(3\)s7a
OR
ciscoiosMatch15.5\(1\)s2
OR
ciscoiosMatch15.5\(1\)s3
OR
ciscoiosMatch15.5\(1\)s4
OR
ciscoiosMatch15.5\(1\)t2
OR
ciscoiosMatch15.5\(1\)t3
OR
ciscoiosMatch15.5\(1\)t4
OR
ciscoiosMatch15.5\(2\)s
OR
ciscoiosMatch15.5\(2\)s1
OR
ciscoiosMatch15.5\(2\)s2
OR
ciscoiosMatch15.5\(2\)s3
OR
ciscoiosMatch15.5\(2\)s4
OR
ciscoiosMatch15.5\(2\)t
OR
ciscoiosMatch15.5\(2\)t1
OR
ciscoiosMatch15.5\(2\)t2
OR
ciscoiosMatch15.5\(2\)t3
OR
ciscoiosMatch15.5\(2\)t4
OR
ciscoiosMatch15.5\(3\)m
OR
ciscoiosMatch15.5\(3\)m0a
OR
ciscoiosMatch15.5\(3\)m1
OR
ciscoiosMatch15.5\(3\)m2
OR
ciscoiosMatch15.5\(3\)m3
OR
ciscoiosMatch15.5\(3\)m4
OR
ciscoiosMatch15.5\(3\)m4a
OR
ciscoiosMatch15.5\(3\)s
OR
ciscoiosMatch15.5\(3\)s0a
OR
ciscoiosMatch15.5\(3\)s1
OR
ciscoiosMatch15.5\(3\)s1a
OR
ciscoiosMatch15.5\(3\)s2
OR
ciscoiosMatch15.5\(3\)s2a
OR
ciscoiosMatch15.5\(3\)s2b
OR
ciscoiosMatch15.5\(3\)s3
OR
ciscoiosMatch15.5\(3\)s3a
OR
ciscoiosMatch15.5\(3\)s4
OR
ciscoiosMatch15.5\(3\)s4a
OR
ciscoiosMatch15.5\(3\)s4b
OR
ciscoiosMatch15.5\(3\)s4d
OR
ciscoiosMatch15.5\(3\)s5
OR
ciscoiosMatch15.6\(1\)s
OR
ciscoiosMatch15.6\(1\)s1
OR
ciscoiosMatch15.6\(1\)s1a
OR
ciscoiosMatch15.6\(1\)s2
OR
ciscoiosMatch15.6\(1\)s3
OR
ciscoiosMatch15.6\(1\)t
OR
ciscoiosMatch15.6\(1\)t0a
OR
ciscoiosMatch15.6\(1\)t1
OR
ciscoiosMatch15.6\(1\)t2
OR
ciscoiosMatch15.6\(2\)s
OR
ciscoiosMatch15.6\(2\)s0a
OR
ciscoiosMatch15.6\(2\)s1
OR
ciscoiosMatch15.6\(2\)s2
OR
ciscoiosMatch15.6\(2\)s3
OR
ciscoiosMatch15.6\(2\)s4
OR
ciscoiosMatch15.6\(2\)sp
OR
ciscoiosMatch15.6\(2\)sp1
OR
ciscoiosMatch15.6\(2\)sp1b
OR
ciscoiosMatch15.6\(2\)sp1c
OR
ciscoiosMatch15.6\(2\)sp2
OR
ciscoiosMatch15.6\(2\)sp2a
OR
ciscoiosMatch15.6\(2\)t
OR
ciscoiosMatch15.6\(2\)t1
OR
ciscoiosMatch15.6\(2\)t2
OR
ciscoiosMatch15.6\(3\)m
OR
ciscoiosMatch15.6\(3\)m0a
OR
ciscoiosMatch15.6\(3\)m1
OR
ciscoiosMatch15.6\(3\)m1b

CNA Affected

[
  {
    "product": "Cisco IOS",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco IOS"
      }
    ]
  }
]

7.8 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

0.004 Low

EPSS

Percentile

72.4%