—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA1
Cisco Security Advisory: Cisco IOS XE Software Web User Interface Denial of Service Vulnerability
Advisory ID: cisco-sa-20170322-webui
Revision: 1.0
For Public Release: 2017 March 22 16:00 GMT
Last Updated: 2017 March 22 16:00 GMT
CVE ID(s): CVE-2017-3856
CVSS Score v(3): 8.6 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
+———————————————————————
Summary
=======
A vulnerability in the web user interface of Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload.
The vulnerability is due to insufficient resource handling by the affected software when the web user interface is under a high load. An attacker could exploit this vulnerability by sending a high number of requests to the web user interface of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition.
To exploit this vulnerability, the attacker must have access to the management interface of the affected software, which is typically connected to a restricted management network.
Cisco has released software updates that address this vulnerability. There are no workarounds that address this vulnerability.
This advisory is available at the following link:
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui [“http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170322-webui”]
This advisory is part of the March 22, 2017, release of the Cisco IOS and IOS XE Software Security Advisory Bundled Publication, which includes five Cisco Security Advisories that describe five vulnerabilities. All the vulnerabilities have a Security Impact Rating of High. For a complete list of the advisories and links to them, see Cisco Event Response: March 2017 Semiannual Cisco IOS and IOS XE Software Security Advisory Bundled Publication [“http://tools.cisco.com/security/center/viewErp.x?alertId=ERP-60851”].
—–BEGIN PGP SIGNATURE—–
iQKBBAEBAgBrBQJY0qKVZBxDaXNjbyBTeXN0ZW1zIFByb2R1Y3QgU2VjdXJpdHkg
SW5jaWRlbnQgUmVzcG9uc2UgVGVhbSAoQ2lzY28gUFNJUlQga2V5IDIwMTYtMjAx
NykgPHBzaXJ0QGNpc2NvLmNvbT4ACgkQrz2APcQAkHnzqhAA6te0GLkg0jYoclHu
QvBTLc3CJj9usmyP9dFyFjy1txgNV/ds/oyc2crZ6Ci7aXCWtmnn/Ypumox86Qn0
+moL7E5svEi59SNh2B7uzcPxePT8ruDfx6iK56ocVZcofa4JuY7W44wpKYeKYGp4
Kyd3xyMeMXehAhzNanRV9l/vqUtyOeGRxCTQ4GFPBJJWbme/2I+uAo5IZ15kNfBd
hWZLNi71xxCS7b4bPxT0+IfN2hqoqfgL+EpP0Syd+O7gtMfIFmhXEMJId87VgYmE
obEi5hDWOJfz1JO5Sd7AcUOe4M5H5sV2nJ7563FTiMg9ZxkmyZv2rn5S9R+eNrCL
k2letO1QPlggAWja7Ir8mEmMoDsFkZ7bYCo5dSOg/AjK3nQL6upyOjx136n8O4IQ
QZtQedgz24UpzxNtzntVfiIX5VE71zFT9zqOTE4FFQ+yqHf85dRGFTfZxwUaotA6
OG1kEnTEwaQ0FgQdQWduVhMJOVmIYYBVZVa9jG3V8vWZsxKKki5WnfAOnKm0pNvE
YjSLdl8FU7TxlZkYL7hAzPvw/8PRYdbGcmVgmEDB0nYdk1szxJTQh8Rf3vf/CXFP
hEQeLOBo/CFO/u61auJfSFnp72pgO4W3JaOHxNxZXUAKZgQ/73AnFSoJgN5QDYpi
b8QgxABB293e5VX3AR+4M67HD30=
=1brZ
—–END PGP SIGNATURE—–
_______________________________________________
cust-security-announce mailing list
cust-security-announce@cisco.com
To unsubscribe, send the command “unsubscribe” in the subject of your message to cust-security-announce-leave@cisco.com