PT-2017-2981 · Cisco · Cisco Ios+1

Published

2017-08-11

·

Updated

2025-01-27

·

CVE-2017-12240

CVSS v2.0

10

Critical

VectorAV:N/AC:L/Au:N/C:C/I:C/A:C
Name of the Vulnerable Software and Affected Versions Cisco IOS versions 12.2 through 15.6 Cisco IOS XE Software (affected versions not specified)
Description The DHCP relay subsystem of the affected software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a buffer overflow condition in the DHCP relay subsystem of the affected software. An attacker could exploit this vulnerability by sending a crafted DHCP Version 4 (DHCPv4) packet to an affected system.
Recommendations For Cisco IOS versions 12.2 through 15.6, update to a fixed version of the software. For Cisco IOS XE Software, update to a fixed version of the software. As a temporary workaround, consider restricting access to the DHCP relay subsystem to minimize the risk of exploitation. At the moment, there is no information about a newer version that contains a fix for this vulnerability.

DoS

RCE

Buffer Overflow

Weakness Enumeration

Related Identifiers

BDU:2017-02323
CVE-2017-12240

Affected Products

Cisco Ios
Cisco Ios Xe