#VU7292 Buffer overflow in Cisco IOS and Cisco IOS XE - CVE-2017-6738
Published: July 3, 2017 / Updated: March 8, 2022
Vulnerability identifier: #VU7292
Vulnerability risk: High
CVSSv4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:A/U:Amber
CVE-ID: CVE-2017-6738
CWE-ID: CWE-120
Exploitation vector: Remote access
Exploit availability:
The vulnerability is being exploited in the wild
Vulnerable software:
Cisco IOS
Cisco IOS XE
Cisco IOS
Cisco IOS XE
Software vendor:
Cisco Systems, Inc
Cisco Systems, Inc
Description
The vulnerability allows a remote authenticated attacker to execute arbitrary code on the target system.
The weakness exists in the Simple Network Management Protocol (SNMP) subsystem due to buffer overflow when handling malicious input. A remote attacker can send specially crafted SNMP packet via IPv4 or IPv6, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability results in system compromise.
The weakness exists in the Simple Network Management Protocol (SNMP) subsystem due to buffer overflow when handling malicious input. A remote attacker can send specially crafted SNMP packet via IPv4 or IPv6, trigger memory corruption and execute arbitrary code on the target system.
Successful exploitation of the vulnerability results in system compromise.
Remediation
The vulnerability is addressed in the following versions:
15.7(3.1.4A)OT, 15.7(2.0n)M, 15.2(1.2.86)SY2, 15.1(2)SY10.98.
15.7(3.1.4A)OT, 15.7(2.0n)M, 15.2(1.2.86)SY2, 15.1(2)SY10.98.