7.8
CVSSv2

CVE-2017-12235

Published: 29/09/2017 Updated: 09/10/2019
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 694
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

A vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco IOS 12.2 up to and including 15.6 could allow an unauthenticated, remote malicious user to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to the improper parsing of ingress PN-DCP Identify Request packets destined to an affected device. An attacker could exploit this vulnerability by sending a crafted PN-DCP Identify Request packet to an affected device and then continuing to send normal PN-DCP Identify Request packets to the device. A successful exploit could allow the malicious user to cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are configured to process PROFINET messages. Beginning with Cisco IOS Software Release 12.2(52)SE, PROFINET is enabled by default on all the base switch module and expansion-unit Ethernet ports. Cisco Bug IDs: CSCuz47179.

Vulnerable Product Search on Vulmon Subscribe to Product

cisco ios 15.6\\(2\\)s2

cisco ios 15.3\\(3\\)jpb2

cisco ios 15.4\\(3\\)s6b

cisco ios 12.2\\(55\\)se5

cisco ios 12.2\\(55\\)se9

cisco ios 15.0\\(2\\)se2

cisco ios 15.6\\(2\\)s3

cisco ios 15.3\\(3\\)jc7

cisco ios 15.5\\(3\\)s2b

cisco ios 15.0\\(2\\)eb

cisco ios 12.4\\(25e\\)jap9

cisco ios 12.2\\(55\\)se11

cisco ios 15.0\\(1\\)ey

cisco ios 12.4\\(25e\\)jap1n

cisco ios 12.2\\(55\\)se3

cisco ios 15.0\\(2\\)ey2

cisco ios 15.0\\(2\\)sqd7

cisco ios 12.2\\(52\\)se

cisco ios 15.0\\(2\\)se3

cisco ios 15.2\\(2\\)e1

cisco ios 15.3\\(3\\)jnp2

cisco ios 15.2\\(1\\)ey

cisco ios 15.5\\(3\\)s4b

cisco ios 15.2\\(2\\)e5b

cisco ios 15.2\\(2\\)e6

cisco ios 15.0\\(2\\)se10

cisco ios 15.3\\(3\\)jc50

cisco ios 15.2\\(2\\)eb

cisco ios 15.6\\(2\\)sp2a

cisco ios 15.0\\(2\\)se7

cisco ios 15.0\\(2\\)se1

cisco ios 15.3\\(3\\)jbb6a

cisco ios 12.4\\(25e\\)jao3a

cisco ios 12.2\\(58\\)se

cisco ios 15.0\\(2\\)ey

cisco ios 15.0\\(2\\)se9

cisco ios 15.4\\(3\\)s7a

cisco ios 15.3\\(3\\)jnd2

cisco ios 15.2\\(5\\)e2a

cisco ios 15.0\\(2\\)se10a

cisco ios 15.0\\(2\\)ey1

cisco ios 12.2\\(55\\)se6

cisco ios 12.4\\(25e\\)jao20s

cisco ios 15.2\\(4\\)ec

cisco ios 15.0\\(2\\)se8

cisco ios 15.2\\(2\\)eb2

cisco ios 15.2\\(5a\\)e1

cisco ios 15.5\\(3\\)s2a

cisco ios 15.0\\(1\\)ey2

cisco ios 15.2\\(2\\)e5a

cisco ios 15.3\\(3\\)jc51

cisco ios 12.2\\(55\\)se

cisco ios 15.2\\(3\\)e1

cisco ios 15.2\\(2\\)e5

cisco ios 15.0\\(2\\)ey3

cisco ios 12.2\\(52\\)se1

cisco ios 15.5\\(3\\)s3a

cisco ios 15.0\\(2\\)se6

cisco ios 15.5\\(3\\)s4d

cisco ios 15.2\\(3\\)ex

cisco ios 15.2\\(2\\)e

cisco ios 15.3\\(3\\)jca7

cisco ios 15.0\\(2\\)ec

cisco ios 15.2\\(3\\)e3

cisco ios 15.2\\(5\\)e2b

cisco ios 15.6\\(2\\)sp1c

cisco ios 15.0\\(1\\)ey1

cisco ios 15.3\\(3\\)jpc3

cisco ios 12.2\\(58\\)se2

cisco ios 15.1\\(2\\)sg7a

cisco ios 15.4\\(3\\)s5a

cisco ios 15.0\\(2\\)se5

cisco ios 15.2\\(2a\\)e2

cisco ios 15.2\\(3\\)e2

cisco ios 15.3\\(3\\)jda3

cisco ios 15.3\\(3\\)je1

cisco ios 15.0\\(2\\)se4

cisco ios 15.3\\(3\\)jnc4

cisco ios 15.2\\(2\\)eb1

cisco ios 15.6\\(2\\)s0a

cisco ios 15.2\\(3\\)e5

cisco ios 15.1\\(2\\)sg9

cisco ios 12.2\\(55\\)se4

cisco ios 15.2\\(3\\)e4

cisco ios 12.2\\(58\\)se1

cisco ios 15.3\\(3\\)jpb

cisco ios 15.2\\(2\\)e4

cisco ios 15.6\\(1\\)s1a

cisco ios 12.2\\(55\\)se10

cisco ios 12.2\\(55\\)se7

cisco ios 15.6\\(2\\)sp1b

cisco ios 15.2\\(2\\)e2

cisco ios 15.2\\(2\\)e3

cisco ios 15.0\\(2\\)se

cisco ios 15.5\\(3\\)s4a

Vendor Advisories

A vulnerability in the implementation of the PROFINET Discovery and Configuration Protocol (PN-DCP) for Cisco IOS Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition The vulnerability is due to the improper parsing of ingress PN-DCP Identify Request packet ...