Action not permitted
Modal body text goes here.
gsd-2017-6743
Vulnerability from gsd
Modified
2023-12-13 01:21
Details
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60376, CSCve78027.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2017-6743", "description": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60376, CSCve78027.", "id": "GSD-2017-6743" }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2017-6743" ], "details": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60376, CSCve78027.", "id": "GSD-2017-6743", "modified": "2023-12-13T01:21:09.664861Z", "schema_version": "1.4.0" } }, "namespaces": { "cisa.gov": { "cveID": "CVE-2017-6743", "dateAdded": "2022-03-03", "dueDate": "2022-03-24", "product": "IOS and IOS XE Software", "requiredAction": "Apply updates per vendor instructions.", "shortDescription": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code.", "vendorProject": "Cisco", "vulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability" }, "cve.org": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6743", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cisco IOS and IOS XE", "version": { "version_data": [ { "version_value": "Cisco IOS and IOS XE" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60376, CSCve78027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "99345", "refsource": "BID", "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1038808" }, { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "12.4", "versionStartIncluding": "12.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "15.6", "versionStartIncluding": "15.0", "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*", "cpe_name": [], "versionEndIncluding": "3.17", "versionStartIncluding": "2.2.0", "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "psirt@cisco.com", "ID": "CVE-2017-6743" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS 12.0 through 12.4 and 15.0 through 15.6 and IOS XE 2.2 through 3.17 contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities. The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP: Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable. Cisco Bug IDs: CSCve60376, CSCve78027." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-119" } ] } ] }, "references": { "reference_data": [ { "name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp", "refsource": "CONFIRM", "tags": [ "Vendor Advisory" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" }, { "name": "1038808", "refsource": "SECTRACK", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1038808" }, { "name": "99345", "refsource": "BID", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/99345" } ] } }, "impact": { "baseMetricV2": { "cvssV2": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "COMPLETE", "baseScore": 9.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:S/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.9 } }, "lastModifiedDate": "2020-08-03T17:09Z", "publishedDate": "2017-07-17T21:29Z" } } }
cve-2017-6743
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2025-07-31 16:24
Severity ?
EPSS score ?
Summary
The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.
The vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload.
Customers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.
There are workarounds that address these vulnerabilities.
References
Impacted products
▼ | Vendor | Product |
---|---|---|
Cisco | IOS | |
IntelliShield | Universal Product |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T15:41:17.269Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "99345", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/99345" }, { "name": "1038808", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1038808" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2017-6743", "options": [ { "Exploitation": "active" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-08T17:35:10.951116Z", "version": "2.0.3" }, "type": "ssvc" } }, { "other": { "content": { "dateAdded": "2022-03-03", "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-6743" }, "type": "kev" } } ], "providerMetadata": { "dateUpdated": "2025-07-30T01:46:25.559Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "timeline": [ { "lang": "en", "time": "2022-03-03T00:00:00+00:00", "value": "CVE-2017-6743 added to CISA KEV" } ], "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "IOS", "vendor": "Cisco", "versions": [ { "status": "affected", "version": "12.1(3)XI" }, { "status": "affected", "version": "12.2(1b)DA" }, { "status": "affected", "version": "12.2(5)DA" }, { "status": "affected", "version": "12.2(7)DA" }, { "status": "affected", "version": "12.2(12)DA" }, { "status": "affected", "version": "12.2(10)DA5" }, { "status": "affected", "version": "12.2(12)DA10" }, { "status": "affected", "version": "12.2(10)DA" }, { "status": "affected", "version": "12.2(12)DA1" }, { "status": "affected", "version": "12.2(12)DA6" }, { "status": "affected", "version": "12.2(10)DA8" }, { "status": "affected", "version": "12.2(12)DA8" }, { "status": "affected", "version": "12.2(12)DA11" }, { "status": "affected", "version": "12.2(12)DA9" }, { "status": "affected", "version": "12.2(12)DA4" }, { "status": "affected", "version": "12.2(10)DA3" }, { "status": "affected", "version": "12.2(5)DA1" }, { "status": "affected", "version": "12.2(12)DA13" }, { "status": "affected", "version": "12.2(12)DA12" }, { "status": "affected", "version": "12.2(12)DA7" }, { "status": "affected", "version": "12.2(1b)DA1" }, { "status": "affected", "version": "12.2(10)DA1" }, { "status": "affected", "version": "12.2(10)DA6" }, { "status": "affected", "version": "12.2(10)DA4" }, { "status": "affected", "version": "12.2(12)DA2" }, { "status": "affected", "version": "12.2(12)DA3" }, { "status": "affected", "version": "12.2(10)DA2" }, { "status": "affected", "version": "12.2(12)DA5" }, { "status": "affected", "version": "12.2(10)DA7" }, { "status": "affected", "version": "12.2(10)DA9" }, { "status": "affected", "version": "12.2(4)XL2" }, { "status": "affected", "version": "12.2(4)XM" }, { "status": "affected", "version": "12.2(4)XM3" }, { "status": "affected", "version": "12.2(4)XM2" }, { "status": "affected", "version": "12.2(4)XM4" }, { "status": "affected", "version": "12.2(4)XM1" }, { "status": "affected", "version": "12.2(3d)" }, { "status": "affected", "version": "12.2(5b)" }, { "status": "affected", "version": "12.2(1)XS1a" }, { "status": "affected", "version": "12.2(4)YA" }, { "status": "affected", "version": "12.2(4)YA6" }, { "status": "affected", "version": "12.2(4)YA3" }, { "status": "affected", "version": "12.2(4)YA4" }, { "status": "affected", "version": "12.2(4)YA1" }, { "status": "affected", "version": "12.2(4)YA11" }, { "status": "affected", "version": "12.2(4)YA2" }, { "status": "affected", "version": "12.2(4)YA9" }, { "status": "affected", "version": "12.2(4)YA8" }, { "status": "affected", "version": "12.2(4)YA5" }, { "status": "affected", "version": "12.2(4)YA12" }, { "status": "affected", "version": "12.2(4)YA10" }, { "status": "affected", "version": "12.2(4)YA7" }, { "status": "affected", "version": "12.2(4)YG" }, { "status": "affected", "version": "12.2(2)XF2" }, { "status": "affected", "version": "12.2(2)DD2" }, { "status": "affected", "version": "12.2(1)XD" }, { "status": "affected", "version": "12.2(1)XD4" }, { "status": "affected", "version": "12.2(1)XD3" }, { "status": "affected", "version": "12.2(1)XD1" }, { "status": "affected", "version": "12.2(2)XH" }, { "status": "affected", "version": "12.2(2)XH2" }, { "status": "affected", "version": "12.2(2)XI" }, { "status": "affected", "version": "12.2(2)XI1" }, { "status": "affected", "version": "12.2(2)XI2" }, { "status": "affected", "version": "12.2(2)XK" }, { "status": "affected", "version": "12.2(2)XK3" }, { "status": "affected", "version": "12.2(2)XK2" }, { "status": "affected", "version": "12.2(4)BW1a" }, { "status": "affected", "version": "12.2(2)BX" }, { "status": "affected", "version": "12.2(2)BX1" }, { "status": "affected", "version": "12.2(15)BZ2" }, { "status": "affected", "version": "12.2(2)DX3" }, { "status": "affected", "version": "12.2(8)YJ" }, { "status": "affected", "version": "12.2(8)YJ1" }, { "status": "affected", "version": "12.2(8)YN" }, { "status": "affected", "version": "12.2(9)YO" }, { "status": "affected", "version": "12.2(9)YO3" }, { "status": "affected", "version": "12.2(9)YO2" }, { "status": "affected", "version": "12.2(9)YO1" }, { "status": "affected", "version": "12.2(9)YO4" }, { "status": "affected", "version": "12.2(1a)XC" }, { "status": "affected", "version": "12.2(2)XC" }, { "status": "affected", "version": "12.2(1a)XC1" }, { "status": "affected", "version": "12.2(1a)XC3" }, { "status": "affected", "version": "12.2(2)XC1" }, { "status": "affected", "version": "12.2(1a)XC2" }, { "status": "affected", "version": "12.2(2)XC2" }, { "status": "affected", "version": "12.2(11)YP3" }, { "status": "affected", "version": "12.2(8)YM" }, { "status": "affected", "version": "12.2(11)YU" }, { "status": "affected", "version": "12.2(11)YV" }, { "status": "affected", "version": "12.2(11)YV1" }, { "status": "affected", "version": "12.2(13)ZG" }, { "status": "affected", "version": "12.2(13)ZH" }, { "status": "affected", "version": "12.2(13)ZH9" }, { "status": "affected", "version": "12.2(13)ZH2" }, { "status": "affected", "version": "12.2(13)ZH8" }, { "status": "affected", "version": "12.2(13)ZH10" }, { "status": "affected", "version": "12.2(13)ZH4" }, { "status": "affected", "version": "12.2(13)ZH3" }, { "status": "affected", "version": "12.2(13)ZH7" }, { "status": "affected", "version": "12.2(13)ZH6" }, { "status": "affected", "version": "12.3(9a)" }, { "status": "affected", "version": "12.3(15)" }, { "status": "affected", "version": "12.3(19)" }, { "status": "affected", "version": "12.3(10f)" }, { "status": "affected", "version": "12.3(10a)" }, { "status": "affected", "version": "12.3(1)" }, { "status": "affected", "version": "12.3(1a)" }, { "status": "affected", "version": "12.3(10)" }, { "status": "affected", "version": "12.3(10b)" }, { "status": "affected", "version": "12.3(10c)" }, { "status": "affected", "version": "12.3(10d)" }, { "status": "affected", "version": "12.3(10e)" }, { "status": "affected", "version": "12.3(12b)" }, { "status": "affected", "version": "12.3(12a)" }, { "status": "affected", "version": "12.3(12c)" }, { "status": "affected", "version": "12.3(12d)" }, { "status": "affected", "version": "12.3(12e)" }, { "status": "affected", "version": "12.3(12)" }, { "status": "affected", "version": "12.3(13)" }, { "status": "affected", "version": "12.3(13a)" }, { "status": "affected", "version": "12.3(13b)" }, { "status": "affected", "version": "12.3(15a)" }, { "status": "affected", "version": "12.3(16)" }, { "status": "affected", "version": "12.3(17)" }, { "status": "affected", "version": "12.3(17a)" }, { "status": "affected", "version": "12.3(17b)" }, { "status": "affected", "version": "12.3(18)" }, { "status": "affected", "version": "12.3(20)" }, { "status": "affected", "version": "12.3(3f)" }, { "status": "affected", "version": "12.3(3e)" }, { "status": "affected", "version": "12.3(3g)" }, { "status": "affected", "version": "12.3(3c)" }, { "status": "affected", "version": "12.3(3b)" }, { "status": "affected", "version": "12.3(3a)" }, { "status": "affected", "version": "12.3(3)" }, { "status": "affected", "version": "12.3(3i)" }, { "status": "affected", "version": "12.3(3h)" }, { "status": "affected", "version": "12.3(5c)" }, { "status": "affected", "version": "12.3(5b)" }, { "status": "affected", "version": "12.3(5a)" }, { "status": "affected", "version": "12.3(5)" }, { "status": "affected", "version": "12.3(5f)" }, { "status": "affected", "version": "12.3(5e)" }, { "status": "affected", "version": "12.3(5d)" }, { "status": "affected", "version": "12.3(6f)" }, { "status": "affected", "version": "12.3(6e)" }, { "status": "affected", "version": "12.3(6c)" }, { "status": "affected", "version": "12.3(6b)" }, { "status": "affected", "version": "12.3(6a)" }, { "status": "affected", "version": "12.3(6)" }, { "status": "affected", "version": "12.3(9d)" }, { "status": "affected", "version": "12.3(9e)" }, { "status": "affected", "version": "12.3(9)" }, { "status": "affected", "version": "12.3(9b)" }, { "status": "affected", "version": "12.3(9c)" }, { "status": "affected", "version": "12.3(16a)" }, { "status": "affected", "version": "12.3(15b)" }, { "status": "affected", "version": "12.3(21)" }, { "status": "affected", "version": "12.3(22)" }, { "status": "affected", "version": "12.3(21b)" }, { "status": "affected", "version": "12.3(23)" }, { "status": "affected", "version": "12.3(26)" }, { "status": "affected", "version": "12.3(20a)" }, { "status": "affected", "version": "12.3(22a)" }, { "status": "affected", "version": "12.3(25)" }, { "status": "affected", "version": "12.3(17c)" }, { "status": "affected", "version": "12.3(24)" }, { "status": "affected", "version": "12.3(19a)" }, { "status": "affected", "version": "12.3(24a)" }, { "status": "affected", "version": "12.3(18a)" }, { "status": "affected", "version": "12.3(11)T" }, { "status": "affected", "version": "12.3(7)T12" }, { "status": "affected", "version": "12.3(11)T11" }, { "status": "affected", "version": "12.3(11)T10" }, { "status": "affected", "version": "12.3(14)T7" }, { "status": "affected", "version": "12.3(14)T" }, { "status": "affected", "version": "12.3(8)T" }, { "status": "affected", "version": "12.3(2)T" }, { "status": "affected", "version": "12.3(4)T" }, { "status": "affected", "version": "12.3(7)T" }, { "status": "affected", "version": "12.3(8)T9" }, { "status": "affected", "version": "12.3(2)T9" }, { "status": "affected", "version": "12.3(8)T6" }, { "status": "affected", "version": "12.3(4)T2a" }, { "status": "affected", "version": "12.3(4)T9" }, { "status": "affected", "version": "12.3(4)T4" }, { "status": "affected", "version": "12.3(2)T1" }, { "status": "affected", "version": "12.3(11)T5" }, { "status": "affected", "version": "12.3(7)T3" }, { "status": "affected", "version": "12.3(2)T2" }, { "status": "affected", "version": "12.3(8)T3" }, { "status": "affected", "version": "12.3(4)T7" }, { "status": "affected", "version": "12.3(8)T7" }, { "status": "affected", "version": "12.3(11)T8" }, { "status": "affected", "version": "12.3(7)T2" }, { "status": "affected", "version": "12.3(8)T4" }, { "status": "affected", "version": "12.3(8)T8" }, { "status": "affected", "version": "12.3(14)T5" }, { "status": "affected", "version": "12.3(11)T3" }, { "status": "affected", "version": "12.3(4)T10" }, { "status": "affected", "version": "12.3(2)T4" }, { "status": "affected", "version": "12.3(8)T10" }, { "status": "affected", "version": "12.3(14)T2" }, { "status": "affected", "version": "12.3(4)T2" }, { "status": "affected", "version": "12.3(7)T7" }, { "status": "affected", "version": "12.3(7)T10" }, { "status": "affected", "version": "12.3(7)T4" }, { "status": "affected", "version": "12.3(11)T6" }, { "status": "affected", "version": "12.3(7)T11" }, { "status": "affected", "version": "12.3(4)T6" }, { "status": "affected", "version": "12.3(2)T3" }, { "status": "affected", "version": "12.3(2)T5" }, { "status": "affected", "version": "12.3(2)T6" }, { "status": "affected", "version": "12.3(4)T3" }, { "status": "affected", "version": "12.3(14)T3" }, { "status": "affected", "version": "12.3(2)T8" }, { "status": "affected", "version": "12.3(11)T4" }, { "status": "affected", "version": "12.3(7)T9" }, { "status": "affected", "version": "12.3(8)T11" }, { "status": "affected", "version": "12.3(11)T9" }, { "status": "affected", "version": "12.3(7)T8" }, { "status": "affected", "version": "12.3(4)T1" }, { "status": "affected", "version": "12.3(8)T5" }, { "status": "affected", "version": "12.3(4)T11" }, { "status": "affected", "version": "12.3(4)T8" }, { "status": "affected", "version": "12.3(14)T1" }, { "status": "affected", "version": "12.3(11)T2" }, { "status": "affected", "version": "12.3(7)T6" }, { "status": "affected", "version": "12.3(2)T7" }, { "status": "affected", "version": "12.3(11)T7" }, { "status": "affected", "version": "12.3(7)T1" }, { "status": "affected", "version": "12.3(14)T6" }, { "status": "affected", "version": "12.3(8)T1" }, { "status": "affected", "version": "12.3(2)XA" }, { "status": "affected", "version": "12.3(2)XA4" }, { "status": "affected", "version": "12.3(2)XA7" }, { "status": "affected", "version": "12.3(2)XA3" }, { "status": "affected", "version": "12.3(2)XA6" }, { "status": "affected", "version": "12.3(2)XA5" }, { "status": "affected", "version": "12.3(4)XQ" }, { "status": "affected", "version": "12.3(4)XQ1" }, { "status": "affected", "version": "12.3(11)XL" }, { "status": "affected", "version": "12.3(11)XL1" }, { "status": "affected", "version": "12.3(4)XK3" }, { "status": "affected", "version": "12.3(4)XK1" }, { "status": "affected", "version": "12.3(4)XK4" }, { "status": "affected", "version": "12.3(4)XK" }, { "status": "affected", "version": "12.3(4)XK2" }, { "status": "affected", "version": "12.3(7)XI1b" }, { "status": "affected", "version": "12.3(7)XI2a" }, { "status": "affected", "version": "12.3(7)XI1c" }, { "status": "affected", "version": "12.3(7)XI8c" }, { "status": "affected", "version": "12.3(4)XG" }, { "status": "affected", "version": "12.3(4)XG3" }, { "status": "affected", "version": "12.3(4)XG1" }, { "status": "affected", "version": "12.3(4)XG4" }, { "status": "affected", "version": "12.3(4)XG2" }, { "status": "affected", "version": "12.3(4)XG5" }, { "status": "affected", "version": "12.3(2)XF" }, { "status": "affected", "version": "12.3(2)XE" }, { "status": "affected", "version": "12.3(2)XE5" }, { "status": "affected", "version": "12.3(2)XE2" }, { "status": "affected", "version": "12.3(2)XE1" }, { "status": "affected", "version": "12.3(2)XE4" }, { "status": "affected", "version": "12.3(2)XE3" }, { "status": "affected", "version": "12.3(4)XD" }, { "status": "affected", "version": "12.3(4)XD4" }, { "status": "affected", "version": "12.3(4)XD1" }, { "status": "affected", "version": "12.3(4)XD3" }, { "status": "affected", "version": "12.3(4)XD2" }, { "status": "affected", "version": "12.3(2)XC" }, { "status": "affected", "version": "12.3(2)XC2" }, { "status": "affected", "version": "12.3(2)XC1" }, { "status": "affected", "version": "12.2(25)SE2" }, { "status": "affected", "version": "12.2(29)SV2" }, { "status": "affected", "version": "12.3(7)XR" }, { "status": "affected", "version": "12.3(7)XR4" }, { "status": "affected", "version": "12.3(7)XR3" }, { "status": "affected", "version": "12.3(7)XR5" }, { "status": "affected", "version": "12.3(7)XR6" }, { "status": "affected", "version": "12.3(7)XR2" }, { "status": "affected", "version": "12.3(7)XR7" }, { "status": "affected", "version": "12.3(8)XX" }, { "status": "affected", "version": "12.3(8)XX1" }, { "status": "affected", "version": "12.3(8)XX2d" }, { "status": "affected", "version": "12.3(2)XZ1" }, { "status": "affected", "version": "12.3(2)XZ2" }, { "status": "affected", "version": "12.3(8)YA" }, { "status": "affected", "version": "12.3(8)YA1" }, { "status": "affected", "version": "12.3(11)YF2" }, { "status": "affected", "version": "12.3(8)YG" }, { "status": "affected", "version": "12.3(8)YG5" }, { "status": "affected", "version": "12.3(8)YG3" }, { "status": "affected", "version": "12.3(8)YG6" }, { "status": "affected", "version": "12.3(8)YG2" }, { "status": "affected", "version": "12.3(8)YG1" }, { "status": "affected", "version": "12.3(8)YG4" }, { "status": "affected", "version": "12.2(12b)M1" }, { "status": "affected", "version": "12.2(12h)M1" }, { "status": "affected", "version": "12.2(4)XV" }, { "status": "affected", "version": "12.2(4)XV1" }, { "status": "affected", "version": "12.2(4)XV2" }, { "status": "affected", "version": "12.2(4)XV4" }, { "status": "affected", "version": "12.2(4)XV4a" }, { "status": "affected", "version": "12.2(4)XV3" }, { "status": "affected", "version": "12.2(4)XV5" }, { "status": "affected", "version": "12.3(8)YI2" }, { "status": "affected", "version": "12.3(8)YI3" }, { "status": "affected", "version": "12.3(8)YI1" }, { "status": "affected", "version": "12.3(11)YK" }, { "status": "affected", "version": "12.3(11)YK1" }, { "status": "affected", "version": "12.3(11)YK2" }, { "status": "affected", "version": "12.3(11)YK3" }, { "status": "affected", "version": "12.2(18)SO1" }, { "status": "affected", "version": "12.2(18)SO3" }, { "status": "affected", "version": "12.2(18)SO2" }, { "status": "affected", "version": "12.3(2)JA3" }, { "status": "affected", "version": "12.3(2)JA4" }, { "status": "affected", "version": "12.3(11)JA3" }, { "status": "affected", "version": "12.3(11)JA2" }, { "status": "affected", "version": "12.3(11)YS" }, { "status": "affected", "version": "12.3(11)YS1" }, { "status": "affected", "version": "12.3(11)YS2" }, { "status": "affected", "version": "12.4(3e)" }, { "status": "affected", "version": "12.4(7b)" }, { "status": "affected", "version": "12.4(8)" }, { "status": "affected", "version": "12.4(5b)" }, { "status": "affected", "version": "12.4(7a)" }, { "status": "affected", "version": "12.4(3d)" }, { "status": "affected", "version": "12.4(1)" }, { "status": "affected", "version": "12.4(1a)" }, { "status": "affected", "version": "12.4(1b)" }, { "status": "affected", "version": "12.4(1c)" }, { "status": "affected", "version": "12.4(10)" }, { "status": "affected", "version": "12.4(3)" }, { "status": "affected", "version": "12.4(3a)" }, { "status": "affected", "version": "12.4(3b)" }, { "status": "affected", "version": "12.4(3c)" }, { "status": "affected", "version": "12.4(3f)" }, { "status": "affected", "version": "12.4(5)" }, { "status": "affected", "version": "12.4(5a)" }, { "status": "affected", "version": "12.4(7c)" }, { "status": "affected", "version": "12.4(7)" }, { "status": "affected", "version": "12.4(8a)" }, { "status": "affected", "version": "12.4(8b)" }, { "status": "affected", "version": "12.4(7d)" }, { "status": "affected", "version": "12.4(3g)" }, { "status": "affected", "version": "12.4(8c)" }, { "status": "affected", "version": "12.4(10b)" }, { "status": "affected", "version": "12.4(12)" }, { "status": "affected", "version": "12.4(12a)" }, { "status": "affected", "version": "12.4(12b)" }, { "status": "affected", "version": "12.4(13)" }, { "status": "affected", "version": "12.4(13a)" }, { "status": "affected", "version": "12.4(13b)" }, { "status": "affected", "version": "12.4(13c)" }, { "status": "affected", "version": "12.4(7e)" }, { "status": "affected", "version": "12.4(17)" }, { "status": "affected", "version": "12.4(25e)" }, { "status": "affected", "version": "12.4(18b)" }, { "status": "affected", "version": "12.4(18e)" }, { "status": "affected", "version": "12.4(25g)" }, { "status": "affected", "version": "12.4(3i)" }, { "status": "affected", "version": "12.4(3j)" }, { "status": "affected", "version": "12.4(23b)" }, { "status": "affected", "version": "12.4(3h)" }, { "status": "affected", "version": "12.4(7h)" }, { "status": "affected", "version": "12.4(25a)" }, { "status": "affected", "version": "12.4(16)" }, { "status": "affected", "version": "12.4(13d)" }, { "status": "affected", "version": "12.4(25)" }, { "status": "affected", "version": "12.4(25c)" }, { "status": "affected", "version": "12.4(19)" }, { "status": "affected", "version": "12.4(13e)" }, { "status": "affected", "version": "12.4(25b)" }, { "status": "affected", "version": "12.4(23)" }, { "status": "affected", "version": "12.4(10c)" }, { "status": "affected", "version": "12.4(21)" }, { "status": "affected", "version": "12.4(16b)" }, { "status": "affected", "version": "12.4(16a)" }, { "status": "affected", "version": "12.4(23a)" }, { "status": "affected", "version": "12.4(25d)" }, { "status": "affected", "version": "12.4(7f)" }, { "status": "affected", "version": "12.4(18)" }, { "status": "affected", "version": "12.4(21a)" }, { "status": "affected", "version": "12.4(13f)" }, { "status": "affected", "version": "12.4(25f)" }, { "status": "affected", "version": "12.4(18c)" }, { "status": "affected", "version": "12.4(5c)" }, { "status": "affected", "version": "12.4(8d)" }, { "status": "affected", "version": "12.4(12c)" }, { "status": "affected", "version": "12.4(17a)" }, { "status": "affected", "version": "12.4(18a)" }, { "status": "affected", "version": "12.4(17b)" }, { "status": "affected", "version": "12.4(7g)" }, { "status": "affected", "version": "12.3(8)JK" }, { "status": "affected", "version": "12.4(6)MR1" }, { "status": "affected", "version": "12.4(11)MR" }, { "status": "affected", "version": "12.4(2)MR" }, { "status": "affected", "version": "12.4(4)MR" }, { "status": "affected", "version": "12.4(6)MR" }, { "status": "affected", "version": "12.4(9)MR" }, { "status": "affected", "version": "12.4(12)MR" }, { "status": "affected", "version": "12.4(16)MR" }, { "status": "affected", "version": "12.4(16)MR1" }, { "status": "affected", "version": "12.4(19)MR2" }, { "status": "affected", "version": "12.4(19)MR1" }, { "status": "affected", "version": "12.4(19)MR" }, { "status": "affected", "version": "12.4(20)MR" }, { "status": "affected", "version": "12.4(4)MR1" }, { "status": "affected", "version": "12.4(19)MR3" }, { "status": "affected", "version": "12.4(12)MR1" }, { "status": "affected", "version": "12.4(20)MR2" }, { "status": "affected", "version": "12.4(16)MR2" }, { "status": "affected", "version": "12.4(12)MR2" }, { "status": "affected", "version": "12.4(2)MR1" }, { "status": "affected", "version": "12.4(20)MR1" }, { "status": "affected", "version": "12.4(4)T" }, { "status": "affected", "version": "12.4(4)T1" }, { "status": "affected", "version": "12.4(4)T2" }, { "status": "affected", "version": "12.4(4)T3" }, { "status": "affected", "version": "12.4(6)T" }, { "status": "affected", "version": "12.4(6)T1" }, { "status": "affected", "version": "12.4(6)T2" }, { "status": "affected", "version": "12.4(9)T" }, { "status": "affected", "version": "12.4(4)T4" }, { "status": "affected", "version": "12.4(2)T5" }, { "status": "affected", "version": "12.4(6)T3" }, { "status": "affected", "version": "12.4(2)T" }, { "status": "affected", "version": "12.4(11)T" }, { "status": "affected", "version": "12.4(15)T" }, { "status": "affected", "version": "12.4(20)T" }, { "status": "affected", "version": "12.4(24)T" }, { "status": "affected", "version": "12.4(24)T3" }, { "status": "affected", "version": "12.4(4)T8" }, { "status": "affected", "version": "12.4(20)T1" }, { "status": "affected", "version": "12.4(22)T1" }, { "status": "affected", "version": "12.4(15)T9" }, { "status": "affected", "version": "12.4(11)T4" }, { "status": "affected", "version": "12.4(15)T8" }, { "status": "affected", "version": "12.4(6)T5" }, { "status": "affected", "version": "12.4(15)T15" }, { "status": "affected", "version": "12.4(24)T5" }, { "status": "affected", "version": "12.4(15)T2" }, { "status": "affected", "version": "12.4(6)T8" }, { "status": "affected", "version": "12.4(15)T12" }, { "status": "affected", "version": "12.4(24)T4" }, { "status": "affected", "version": "12.4(6)T11" }, { "status": "affected", "version": "12.4(9)T5" }, { "status": "affected", "version": "12.4(20)T3" }, { "status": "affected", "version": "12.4(6)T4" }, { "status": "affected", "version": "12.4(4)T6" }, { "status": "affected", "version": "12.4(22)T" }, { "status": "affected", "version": "12.4(20)T6" }, { "status": "affected", "version": "12.4(9)T3" }, { "status": "affected", "version": "12.4(24)T8" }, { "status": "affected", "version": "12.4(6)T7" }, { "status": "affected", "version": "12.4(15)T13" }, { "status": "affected", "version": "12.4(6)T10" }, { "status": "affected", "version": "12.4(15)T3" }, { "status": "affected", "version": "12.4(24)T2" }, { "status": "affected", "version": "12.4(22)T5" }, { "status": "affected", "version": "12.4(2)T3" }, { "status": "affected", "version": "12.4(15)T10" }, { "status": "affected", "version": "12.4(22)T4" }, { "status": "affected", "version": "12.4(20)T5" }, { "status": "affected", "version": "12.4(9)T6" }, { "status": "affected", "version": "12.4(15)T4" }, { "status": "affected", "version": "12.4(2)T4" }, { "status": "affected", "version": "12.4(24)T1" }, { "status": "affected", "version": "12.4(9)T4" }, { "status": "affected", "version": "12.4(24)T7" }, { "status": "affected", "version": "12.4(22)T3" }, { "status": "affected", "version": "12.4(9)T1" }, { "status": "affected", "version": "12.4(24)T6" }, { "status": "affected", "version": "12.4(6)T9" }, { "status": "affected", "version": "12.4(15)T5" }, { "status": "affected", "version": "12.4(4)T7" }, { "status": "affected", "version": "12.4(20)T2" }, { "status": "affected", "version": "12.4(2)T1" }, { "status": "affected", "version": "12.4(11)T1" }, { "status": "affected", "version": "12.4(15)T11" }, { "status": "affected", "version": "12.4(2)T6" }, { "status": "affected", "version": "12.4(2)T2" }, { "status": "affected", "version": "12.4(15)T7" }, { "status": "affected", "version": "12.4(11)T2" }, { "status": "affected", "version": "12.4(9)T7" }, { "status": "affected", "version": "12.4(15)T14" }, { "status": "affected", "version": "12.4(11)T3" }, { "status": "affected", "version": "12.4(15)T6" }, { "status": "affected", "version": "12.4(15)T16" }, { "status": "affected", "version": "12.4(15)T1" }, { "status": "affected", "version": "12.4(9)T2" }, { "status": "affected", "version": "12.4(6)T6" }, { "status": "affected", "version": "12.4(22)T2" }, { "status": "affected", "version": "12.4(4)T5" }, { "status": "affected", "version": "12.4(20)T4" }, { "status": "affected", "version": "12.4(15)T17" }, { "status": "affected", "version": "12.3(14)YT" }, { "status": "affected", "version": "12.3(14)YT1" }, { "status": "affected", "version": "12.3(7)JX2" }, { "status": "affected", "version": "12.3(7)JX" }, { "status": "affected", "version": "12.3(7)JX1" }, { "status": "affected", "version": "12.3(7)JX4" }, { "status": "affected", "version": "12.3(11)JX" }, { "status": "affected", "version": "12.3(7)JX7" }, { "status": "affected", "version": "12.3(7)JX12" }, { "status": "affected", "version": "12.3(7)JX9" }, { "status": "affected", "version": "12.3(7)JX10" }, { "status": "affected", "version": "12.3(11)JX1" }, { "status": "affected", "version": "12.3(7)JX6" }, { "status": "affected", "version": "12.3(7)JX5" }, { "status": "affected", "version": "12.3(7)JX3" }, { "status": "affected", "version": "12.3(7)JX11" }, { "status": "affected", "version": "12.3(7)JX8" }, { "status": "affected", "version": "12.3(4)TPC11b" }, { "status": "affected", "version": "12.3(4)TPC11a" }, { "status": "affected", "version": "12.4(2)XA" }, { "status": "affected", "version": "12.4(2)XA1" }, { "status": "affected", "version": "12.4(2)XA2" }, { "status": "affected", "version": "12.2(28)ZX" }, { "status": "affected", "version": "12.4(4)XC" }, { "status": "affected", "version": "12.4(4)XC1" }, { "status": "affected", "version": "12.4(4)XC5" }, { "status": "affected", "version": "12.4(4)XC7" }, { "status": "affected", "version": "12.4(4)XC3" }, { "status": "affected", "version": "12.4(4)XC4" }, { "status": "affected", "version": "12.4(4)XC2" }, { "status": "affected", "version": "12.4(4)XC6" }, { "status": "affected", "version": "12.4(6)XE" }, { "status": "affected", "version": "12.4(6)XE2" }, { "status": "affected", "version": "12.4(6)XE1" }, { "status": "affected", "version": "12.3(11)YZ1" }, { "status": "affected", "version": "12.3(11)YZ" }, { "status": "affected", "version": "12.3(11)YZ2" }, { "status": "affected", "version": "12.4(11)SW" }, { "status": "affected", "version": "12.4(15)SW6" }, { "status": "affected", "version": "12.4(15)SW" }, { "status": "affected", "version": "12.4(11)SW1" }, { "status": "affected", "version": "12.4(15)SW5" }, { "status": "affected", "version": "12.4(15)SW1" }, { "status": "affected", "version": "12.4(15)SW4" }, { "status": "affected", "version": "12.4(11)SW3" }, { "status": "affected", "version": "12.4(11)SW2" }, { "status": "affected", "version": "12.4(15)SW3" }, { "status": "affected", "version": "12.4(15)SW2" }, { "status": "affected", "version": "12.4(15)SW7" }, { "status": "affected", "version": "12.4(15)SW8" }, { "status": "affected", "version": "12.4(15)SW8a" }, { "status": "affected", "version": "12.4(15)SW9" }, { "status": "affected", "version": "12.4(11)XJ" }, { "status": "affected", "version": "12.4(11)XJ3" }, { "status": "affected", "version": "12.4(11)XJ2" }, { "status": "affected", "version": "12.4(11)XJ4" }, { "status": "affected", "version": "12.4(6)XT" }, { "status": "affected", "version": "12.4(6)XT1" }, { "status": "affected", "version": "12.4(6)XT2" }, { "status": "affected", "version": "12.4(11)MD2" }, { "status": "affected", "version": "12.4(11)XV" }, { "status": "affected", "version": "12.4(11)XV1" }, { "status": "affected", "version": "12.4(11)XW" }, { "status": "affected", "version": "12.4(11)XW3" }, { "status": "affected", "version": "12.4(11)XW7" }, { "status": "affected", "version": "12.4(11)XW10" }, { "status": "affected", "version": "12.4(11)XW8" }, { "status": "affected", "version": "12.4(11)XW9" }, { "status": "affected", "version": "12.4(11)XW6" }, { "status": "affected", "version": "12.4(11)XW4" }, { "status": "affected", "version": "12.4(11)XW1" }, { "status": "affected", "version": "12.4(11)XW5" }, { "status": "affected", "version": "12.4(11)XW2" }, { "status": "affected", "version": "12.4(3g)JMA1" }, { "status": "affected", "version": "12.4(15)XY4" }, { "status": "affected", "version": "12.4(15)XY5" }, { "status": "affected", "version": "12.4(15)XY1" }, { "status": "affected", "version": "12.4(15)XY" }, { "status": "affected", "version": "12.4(15)XY2" }, { "status": "affected", "version": "12.4(15)XY3" }, { "status": "affected", "version": "12.4(15)XZ" }, { "status": "affected", "version": "12.4(15)XZ2" }, { "status": "affected", "version": "12.4(15)XZ1" }, { "status": "affected", "version": "12.3(8)ZA" }, { "status": "affected", "version": "12.2(33)STE0" }, { "status": "affected", "version": "12.4(10b)JDA1" }, { "status": "affected", "version": "12.4(3g)JMB" }, { "status": "affected", "version": "12.4(23c)JY" }, { "status": "affected", "version": "12.4(10b)JDC" }, { "status": "affected", "version": "12.4(10b)JDD" }, { "status": "affected", "version": "15.0(1)M1" }, { "status": "affected", "version": "15.0(1)M5" }, { "status": "affected", "version": "15.0(1)M4" }, { "status": "affected", "version": "15.0(1)M3" }, { "status": "affected", "version": "15.0(1)M2" }, { "status": "affected", "version": "15.0(1)M6" }, { "status": "affected", "version": "15.0(1)M" }, { "status": "affected", "version": "15.0(1)M7" }, { "status": "affected", "version": "15.0(1)M10" }, { "status": "affected", "version": "15.0(1)M9" }, { "status": "affected", "version": "15.0(1)M8" }, { "status": "affected", "version": "15.0(1)XA2" }, { "status": "affected", "version": "15.0(1)XA4" }, { "status": "affected", "version": "15.0(1)XA1" }, { "status": "affected", "version": "15.0(1)XA3" }, { "status": "affected", "version": "15.0(1)XA" }, { "status": "affected", "version": "15.0(1)XA5" }, { "status": "affected", "version": "15.1(2)T" }, { "status": "affected", "version": "15.1(1)T4" }, { "status": "affected", "version": "15.1(3)T2" }, { "status": "affected", "version": "15.1(1)T1" }, { "status": "affected", "version": "15.1(2)T0a" }, { "status": "affected", "version": "15.1(3)T3" }, { "status": "affected", "version": "15.1(1)T3" }, { "status": "affected", "version": "15.1(2)T3" }, { "status": "affected", "version": "15.1(2)T4" }, { "status": "affected", "version": "15.1(1)T2" }, { "status": "affected", "version": "15.1(3)T" }, { "status": "affected", "version": "15.1(2)T2a" }, { "status": "affected", "version": "15.1(3)T1" }, { "status": "affected", "version": "15.1(1)T" }, { "status": "affected", "version": "15.1(2)T2" }, { "status": "affected", "version": "15.1(2)T1" }, { "status": "affected", "version": "15.1(2)T5" }, { "status": "affected", "version": "15.1(3)T4" }, { "status": "affected", "version": "15.1(1)T5" }, { "status": "affected", "version": "15.1(1)XB" }, { "status": "affected", "version": "15.0(1)XO1" }, { "status": "affected", "version": "15.0(1)XO" }, { "status": "affected", "version": "15.0(2)XO" }, { "status": "affected", "version": "12.2(33)MRA" }, { "status": "affected", "version": "12.2(33)MRB5" }, { "status": "affected", "version": "12.2(33)MRB2" }, { "status": "affected", "version": "12.2(33)MRB1" }, { "status": "affected", "version": "12.2(33)MRB4" }, { "status": "affected", "version": "12.2(33)MRB" }, { "status": "affected", "version": "12.2(33)MRB3" }, { "status": "affected", "version": "12.2(33)MRB6" }, { "status": "affected", "version": "15.3(1)T" }, { "status": "affected", "version": "15.3(2)T" }, { "status": "affected", "version": "15.3(1)T1" }, { "status": "affected", "version": "15.3(1)T2" }, { "status": "affected", "version": "15.3(1)T3" }, { "status": "affected", "version": "15.3(1)T4" }, { "status": "affected", "version": "15.3(2)T1" }, { "status": "affected", "version": "15.3(2)T2" }, { "status": "affected", "version": "15.3(2)T3" }, { "status": "affected", "version": "15.3(2)T4" }, { "status": "affected", "version": "12.4(10b)JDE" }, { "status": "affected", "version": "15.0(1)EY" }, { "status": "affected", "version": "15.0(1)EY1" }, { "status": "affected", "version": "15.0(1)EY2" }, { "status": "affected", "version": "12.4(20)MRB" }, { "status": "affected", "version": "12.4(20)MRB1" }, { "status": "affected", "version": "15.1(4)M3" }, { "status": "affected", "version": "15.1(4)M" }, { "status": "affected", "version": "15.1(4)M1" }, { "status": "affected", "version": "15.1(4)M2" }, { "status": "affected", "version": "15.1(4)M6" }, { "status": "affected", "version": "15.1(4)M5" }, { "status": "affected", "version": "15.1(4)M4" }, { "status": "affected", "version": "15.1(4)M7" }, { "status": "affected", "version": "15.1(4)M10" }, { "status": "affected", "version": "15.1(4)M8" }, { "status": "affected", "version": "15.1(4)M9" }, { "status": "affected", "version": "12.4(3g)JMC1" }, { "status": "affected", "version": "12.4(3g)JMC" }, { "status": "affected", "version": "12.4(3g)JMC2" }, { "status": "affected", "version": "15.0(2)SE8" }, { "status": "affected", "version": "15.1(2)GC" }, { "status": "affected", "version": "15.1(2)GC1" }, { "status": "affected", "version": "15.1(2)GC2" }, { "status": "affected", "version": "15.1(4)GC" }, { "status": "affected", "version": "15.1(4)GC1" }, { "status": "affected", "version": "15.1(4)GC2" }, { "status": "affected", "version": "15.2(4)M" }, { "status": "affected", "version": "15.2(4)M1" }, { "status": "affected", "version": "15.2(4)M2" }, { "status": "affected", "version": "15.2(4)M4" }, { "status": "affected", "version": "15.2(4)M3" }, { "status": "affected", "version": "15.2(4)M5" }, { "status": "affected", "version": "15.2(4)M8" }, { "status": "affected", "version": "15.2(4)M10" }, { "status": "affected", "version": "15.2(4)M7" }, { "status": "affected", "version": "15.2(4)M6" }, { "status": "affected", "version": "15.2(4)M9" }, { "status": "affected", "version": "15.2(4)M6a" }, { "status": "affected", "version": "15.2(4)M11" }, { "status": "affected", "version": "15.0(2)SG11a" }, { "status": "affected", "version": "12.4(21a)JHC" }, { "status": "affected", "version": "15.0(1)EX" }, { "status": "affected", "version": "15.0(2)EX2" }, { "status": "affected", "version": "15.0(2)EX8" }, { "status": "affected", "version": "15.0(2)EX10" }, { "status": "affected", "version": "15.0(2)EX11" }, { "status": "affected", "version": "15.0(2)EX13" }, { "status": "affected", "version": "15.0(2)EX12" }, { "status": "affected", "version": "15.2(1)GC" }, { "status": "affected", "version": "15.2(1)GC1" }, { "status": "affected", "version": "15.2(1)GC2" }, { "status": "affected", "version": "15.2(2)GC" }, { "status": "affected", "version": "15.2(3)GC" }, { "status": "affected", "version": "15.2(3)GC1" }, { "status": "affected", "version": "15.2(4)GC" }, { "status": "affected", "version": "15.2(4)GC2" }, { "status": "affected", "version": "15.2(4)GC3" }, { "status": "affected", "version": "15.4(1)T" }, { "status": "affected", "version": "15.4(2)T" }, { "status": "affected", "version": "15.4(1)T2" }, { "status": "affected", "version": "15.4(1)T1" }, { "status": "affected", "version": "15.4(1)T3" }, { "status": "affected", "version": "15.4(2)T1" }, { "status": "affected", "version": "15.4(2)T3" }, { "status": "affected", "version": "15.4(2)T2" }, { "status": "affected", "version": "15.4(1)T4" }, { "status": "affected", "version": "15.4(2)T4" }, { "status": "affected", "version": "15.2(2a)E2" }, { "status": "affected", "version": "15.2(3a)E" }, { "status": "affected", "version": "15.2(3)E4" }, { "status": "affected", "version": "15.2(2)E5b" }, { "status": "affected", "version": "15.2(6)E0c" }, { "status": "affected", "version": "15.1(3)MRA3" }, { "status": "affected", "version": "15.1(3)MRA4" }, { "status": "affected", "version": "15.1(3)SVB1" }, { "status": "affected", "version": "15.1(3)SVB2" }, { "status": "affected", "version": "15.4(2)S3" }, { "status": "affected", "version": "15.3(3)M" }, { "status": "affected", "version": "15.3(3)M1" }, { "status": "affected", "version": "15.3(3)M2" }, { "status": "affected", "version": "15.3(3)M3" }, { "status": "affected", "version": "15.3(3)M5" }, { "status": "affected", "version": "15.3(3)M4" }, { "status": "affected", "version": "15.3(3)M6" }, { "status": "affected", "version": "15.3(3)M7" }, { "status": "affected", "version": "15.3(3)M8" }, { "status": "affected", "version": "15.3(3)M9" }, { "status": "affected", "version": "15.3(3)M8a" }, { "status": "affected", "version": "15.2(4)JN" }, { "status": "affected", "version": "15.1(3)SVD" }, { "status": "affected", "version": "15.1(3)SVD1" }, { "status": "affected", "version": "15.1(3)SVD2" }, { "status": "affected", "version": "15.1(3)SVF" }, { "status": "affected", "version": "15.1(3)SVF1" }, { "status": "affected", "version": "15.1(3)SVE" }, { "status": "affected", "version": "15.2(4)JAZ1" }, { "status": "affected", "version": "15.4(1)CG" }, { "status": "affected", "version": "15.4(1)CG1" }, { "status": "affected", "version": "15.4(2)CG" }, { "status": "affected", "version": "15.1(3)SVG" }, { "status": "affected", "version": "15.5(1)T" }, { "status": "affected", "version": "15.5(1)T1" }, { "status": "affected", "version": "15.5(2)T" }, { "status": "affected", "version": "15.5(1)T2" }, { "status": "affected", "version": "15.5(1)T3" }, { "status": "affected", "version": "15.5(2)T1" }, { "status": "affected", "version": "15.5(2)T2" }, { "status": "affected", "version": "15.5(2)T3" }, { "status": "affected", "version": "15.5(2)T4" }, { "status": "affected", "version": "15.5(1)T4" }, { "status": "affected", "version": "15.5(3)M" }, { "status": "affected", "version": "15.5(3)M1" }, { "status": "affected", "version": "15.5(3)M0a" }, { "status": "affected", "version": "15.5(3)M2" }, { "status": "affected", "version": "15.5(3)M3" }, { "status": "affected", "version": "15.5(3)M4" }, { "status": "affected", "version": "15.5(3)M4a" }, { "status": "affected", "version": "15.5(3)M5" }, { "status": "affected", "version": "15.3(3)JAA1" }, { "status": "affected", "version": "15.0(2)SQD" }, { "status": "affected", "version": "15.0(2)SQD1" }, { "status": "affected", "version": "15.0(2)SQD2" }, { "status": "affected", "version": "15.0(2)SQD3" }, { "status": "affected", "version": "15.0(2)SQD4" }, { "status": "affected", "version": "15.0(2)SQD5" }, { "status": "affected", "version": "15.0(2)SQD6" }, { "status": "affected", "version": "15.0(2)SQD7" }, { "status": "affected", "version": "15.0(2)SQD8" }, { "status": "affected", "version": "15.6(1)T" }, { "status": "affected", "version": "15.6(2)T" }, { "status": "affected", "version": "15.6(1)T0a" }, { "status": "affected", "version": "15.6(1)T1" }, { "status": "affected", "version": "15.6(2)T1" }, { "status": "affected", "version": "15.6(1)T2" }, { "status": "affected", "version": "15.6(2)T2" }, { "status": "affected", "version": "15.6(3)M" }, { "status": "affected", "version": "15.6(3)M1" }, { "status": "affected", "version": "15.6(3)M0a" }, { "status": "affected", "version": "15.6(3)M1b" }, { "status": "affected", "version": "15.6(3)M2" }, { "status": "affected", "version": "15.6(3)M2a" }, { "status": "affected", "version": "15.1(3)SVJ2" }, { "status": "affected", "version": "15.3(3)JPC5" }, { "status": "affected", "version": "15.3(3)JPR1" } ] }, { "product": "Universal Product", "vendor": "IntelliShield", "versions": [ { "status": "affected", "version": "N/A" } ] } ], "descriptions": [ { "lang": "en", "value": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE Software contains multiple vulnerabilities that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload. An attacker could exploit these vulnerabilities by sending a crafted SNMP packet to an affected system via IPv4 or IPv6. Only traffic directed to an affected system can be used to exploit these vulnerabilities.\r\n\r\nThe vulnerabilities are due to a buffer overflow condition in the SNMP subsystem of the affected software. The vulnerabilities affect all versions of SNMP - Versions 1, 2c, and 3. To exploit these vulnerabilities via SNMP Version 2c or earlier, the attacker must know the SNMP read-only community string for the affected system. To exploit these vulnerabilities via SNMP Version 3, the attacker must have user credentials for the affected system. A successful exploit could allow the attacker to execute arbitrary code and obtain full control of the affected system or cause the affected system to reload.\r\n\r\nCustomers are advised to apply the workaround as contained in the Workarounds section below. Fixed software information is available via the Cisco IOS Software Checker. All devices that have enabled SNMP and have not explicitly excluded the affected MIBs or OIDs should be considered vulnerable.\r\n\r\n There are workarounds that address these vulnerabilities." } ], "exploits": [ { "lang": "en", "value": "At the time of initial publication, Cisco was aware of external knowledge of the vulnerabilities described in this advisory and, as a precaution, notified customers about the potential for exploitation.\r\n\r\nOn January 6, 2017, a security researcher published functional exploit code for these vulnerabilities.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) is aware of exploitation of the following vulnerabilities that are described in this advisory:\r\n\r\nCVE-2017-6736\r\nCVE-2017-6737\r\nCVE-2017-6738\r\nCVE-2017-6739\r\nCVE-2017-6740\r\nCVE-2017-6742\r\nCVE-2017-6743\r\nCVE-2017-6744\r\n\r\nThe Cisco PSIRT is aware of exploit code available for CVE-2017-6741.\r\n\r\nAdditional information can be found at Cisco TALOS: DNS Hijacking Abuses Trust In Core Internet Service [\"https://blog.talosintelligence.com/2019/04/seaturtle.html\"]." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "format": "cvssV3_0" } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-119", "description": "Improper Restriction of Operations within the Bounds of a Memory Buffer", "lang": "en", "type": "cwe" } ] } ], "providerMetadata": { "dateUpdated": "2025-07-31T16:24:19.482Z", "orgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "shortName": "cisco" }, "references": [ { "name": "cisco-sa-20170629-snmp", "url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp" } ], "source": { "advisory": "cisco-sa-20170629-snmp", "defects": [ "CSCve78027", "CSCve60376" ], "discovery": "UNKNOWN" } } }, "cveMetadata": { "assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633", "assignerShortName": "cisco", "cveId": "CVE-2017-6743", "datePublished": "2017-07-17T21:00:00.000Z", "dateReserved": "2017-03-09T00:00:00.000Z", "dateUpdated": "2025-07-31T16:24:19.482Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading...
Loading...
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.