Lucene search

K
nvd[email protected]NVD:CVE-2017-3826
HistoryMar 01, 2017 - 9:59 p.m.

CVE-2017-3826

2017-03-0121:59:00
CWE-20
CWE-399
web.nvd.nist.gov
1

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.006

Percentile

77.8%

A vulnerability in the Stream Control Transmission Protocol (SCTP) decoder of the Cisco NetFlow Generation Appliance (NGA) with software before 1.1(1a) could allow an unauthenticated, remote attacker to cause the device to hang or unexpectedly reload, causing a denial of service (DoS) condition. The vulnerability is due to incomplete validation of SCTP packets being monitored on the NGA data ports. An attacker could exploit this vulnerability by sending malformed SCTP packets on a network that is monitored by an NGA data port. SCTP packets addressed to the IP address of the NGA itself will not trigger this vulnerability. An exploit could allow the attacker to cause the appliance to become unresponsive or reload, causing a DoS condition. User interaction could be needed to recover the device using the reboot command from the CLI. The following Cisco NetFlow Generation Appliances are vulnerable: NGA 3140, NGA 3240, NGA 3340. Cisco Bug IDs: CSCvc83320.

Affected configurations

Nvd
Node
cisconetflow_generation_appliance_3140Match-
OR
cisconetflow_generation_appliance_3240Match-
OR
cisconetflow_generation_appliance_3340Match-
AND
cisconetflow_generation_appliance_softwareMatch1.0\(2\)
OR
cisconetflow_generation_appliance_softwareMatch1.0.0
OR
cisconetflow_generation_appliance_softwareMatch1.1\(1\)
OR
cisconetflow_generation_appliance_softwareMatch1.1.0
VendorProductVersionCPE
cisconetflow_generation_appliance_3140-cpe:2.3:h:cisco:netflow_generation_appliance_3140:-:*:*:*:*:*:*:*
cisconetflow_generation_appliance_3240-cpe:2.3:h:cisco:netflow_generation_appliance_3240:-:*:*:*:*:*:*:*
cisconetflow_generation_appliance_3340-cpe:2.3:h:cisco:netflow_generation_appliance_3340:-:*:*:*:*:*:*:*
cisconetflow_generation_appliance_software1.0(2)cpe:2.3:o:cisco:netflow_generation_appliance_software:1.0\(2\):*:*:*:*:*:*:*
cisconetflow_generation_appliance_software1.0.0cpe:2.3:o:cisco:netflow_generation_appliance_software:1.0.0:*:*:*:*:*:*:*
cisconetflow_generation_appliance_software1.1(1)cpe:2.3:o:cisco:netflow_generation_appliance_software:1.1\(1\):*:*:*:*:*:*:*
cisconetflow_generation_appliance_software1.1.0cpe:2.3:o:cisco:netflow_generation_appliance_software:1.1.0:*:*:*:*:*:*:*

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:N/A:P

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

EPSS

0.006

Percentile

77.8%

Related for NVD:CVE-2017-3826