⚠ Actively exploited
Added to CISA KEV on 2022-03-03. Federal agencies required to patch by 2022-03-24. Required action: Apply updates per vendor instructions..

CVE-2017-12231Cisco IOS vulnerability

CWE-3996 documents6 sources
Severity
7.5HIGHNVD
EPSS
6.8%
top 8.65%
CISA KEV
KEV
Added 2022-03-03
Due 2022-03-24
Exploit
Exploited in wild
Active exploitation observed
Affected products
Timeline
PublishedSep 29
KEV addedMar 3
KEV dueMar 24
Latest updateMay 13
CISA Required Action: Apply updates per vendor instructions.

Description

A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 12.4 through 15.6 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to the improper translation of H.323 messages that use the Registration, Admission, and Status (RAS) protocol and are sent to an affected device via IPv4 packets. An attacker could exploit this vulnerability by sending a crafted H.323 RAS

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:HExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDcisco/ios12.415.6
CVEListV5cisco/cisco_iosCisco IOS

🔴Vulnerability Details

3
GHSA
GHSA-83rp-43rf-7hmv: A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 122022-05-13
CVEList
CVE-2017-12231: A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS 122017-09-28
VulnCheck
Cisco IOS Software Network Address Translation Denial-of-Service Vulnerability2017

📋Vendor Advisories

2
CISA
Cisco IOS Software Network Address Translation Denial-of-Service Vulnerability2022-03-03
Cisco
Cisco IOS Software Network Address Translation Denial of Service Vulnerability2017-09-27
CVE-2017-12231 — Cisco IOS vulnerability | cvebase