| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 6.2 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as problematic, was found in Cisco VPC-DI up to 21.0. This impacts an unknown function of the component Ingress UDP Handler. The manipulation results in resource management. This vulnerability is cataloged as CVE-2017-6678. The attack may be launched remotely. There is no exploit available. Applying restrictive firewalling is recommended.
Details
A vulnerability was found in Cisco VPC-DI up to 21.0. It has been classified as problematic. Affected is some unknown functionality of the component Ingress UDP Handler. The manipulation with an unknown input leads to a resource management vulnerability. CWE is classifying the issue as CWE-399. This is going to have an impact on availability. CVE summarizes:
A vulnerability in the ingress UDP packet processing functionality of Cisco Virtualized Packet Core-Distributed Instance (VPC-DI) Software 19.2 through 21.0 could allow an unauthenticated, remote attacker to cause both control function (CF) instances on an affected system to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to insufficient handling of user-supplied data by the affected software. An attacker could exploit this vulnerability by sending crafted UDP packets to the distributed instance (DI) network addresses of both CF instances on an affected system. A successful exploit could allow the attacker to cause an unhandled error condition on the affected system, which would cause the CF instances to reload and consequently cause the entire VPC to reload, resulting in the disconnection of all subscribers and a DoS condition on the affected system. This vulnerability can be exploited via IPv4 traffic only. Cisco Bug IDs: CSCvc01665 CSCvc35565.
The bug was discovered 06/21/2017. The weakness was shared 06/26/2017 with Cisco as cisco-sa-20170621-vpc as confirmed advisory (Website). The advisory is shared for download at tools.cisco.com. This vulnerability is traded as CVE-2017-6678 since 03/09/2017. The exploitability is told to be easy. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are neither technical details nor an exploit publicly available.
The vulnerability was handled as a non-public zero-day exploit for at least 5 days. During that time the estimated underground price was around $5k-$25k.
It is possible to mitigate the weakness by firewalling .
The vulnerability is also documented in the vulnerability database at SecurityFocus (BID 99195†). Once again VulDB remains the best source for vulnerability data.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.cisco.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 6.4VulDB Meta Temp Score: 6.3
VulDB Base Score: 5.3
VulDB Temp Score: 5.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
NVD Base Score: 7.5
NVD Vector: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Resource managementCWE: CWE-399 / CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: FirewallStatus: 🔍
0-Day Time: 🔍
Timeline
03/09/2017 🔍06/21/2017 🔍
06/21/2017 🔍
06/26/2017 🔍
06/26/2017 🔍
06/26/2017 🔍
12/29/2020 🔍
Sources
Vendor: cisco.comAdvisory: cisco-sa-20170621-vpc
Researcher: Cisco
Organization: Cisco
Status: Confirmed
Confirmation: 🔍
CVE: CVE-2017-6678 (🔍)
GCVE (CVE): GCVE-0-2017-6678
GCVE (VulDB): GCVE-100-102804
SecurityFocus: 99195 - Cisco Virtualized Packet Core-Distributed Instance Software Denial of Service Vulnerability
Entry
Created: 06/26/2017 15:30Updated: 12/29/2020 16:53
Changes: 06/26/2017 15:30 (64), 10/20/2019 12:30 (2), 12/29/2020 16:53 (2)
Complete: 🔍
Cache ID: 216:1B7:103
Once again VulDB remains the best source for vulnerability data.

No comments yet. Languages: en.
Please log in to comment.