PT-2017-2981 · Cisco · Cisco Ios+1
Published
2017-08-11
·
Updated
2025-01-27
·
CVE-2017-12240
CVSS v2.0
10
Critical
| Vector | AV:N/AC:L/Au:N/C:C/I:C/A:C |
Name of the Vulnerable Software and Affected Versions
Cisco IOS versions 12.2 through 15.6
Cisco IOS XE Software (affected versions not specified)
Description
The DHCP relay subsystem of the affected software contains a vulnerability that could allow an unauthenticated, remote attacker to execute arbitrary code and gain full control of an affected system. The attacker could also cause an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to a buffer overflow condition in the DHCP relay subsystem of the affected software. An attacker could exploit this vulnerability by sending a crafted DHCP Version 4 (DHCPv4) packet to an affected system.
Recommendations
For Cisco IOS versions 12.2 through 15.6, update to a fixed version of the software.
For Cisco IOS XE Software, update to a fixed version of the software.
As a temporary workaround, consider restricting access to the DHCP relay subsystem to minimize the risk of exploitation.
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
DoS
RCE
Buffer Overflow
Found an issue in the description? Have something to add? Feel free to write us 👾
Related Identifiers
Affected Products
Cisco Ios
Cisco Ios Xe