ID

VAR-201709-0686


CVE

CVE-2017-12223


TITLE

Cisco IR800 Integrated Services Router Software input validation vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2017-007986 // CNNVD: CNNVD-201709-226

DESCRIPTION

A vulnerability in the ROM Monitor (ROMMON) code of Cisco IR800 Integrated Services Router Software could allow an unauthenticated, local attacker to boot an unsigned Hypervisor on an affected device and compromise the integrity of the system. The vulnerability is due to insufficient sanitization of user input. An attacker who can access an affected router via the console could exploit this vulnerability by entering ROMMON mode and modifying ROMMON variables. A successful exploit could allow the attacker to execute arbitrary code and install a malicious version of Hypervisor firmware on an affected device. Cisco Bug IDs: CSCvb44027. Cisco IR800 Integrated Services Router The software contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvb44027 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Failed attempts may lead to denial-of-service conditions. ROM Monitor is one of the resource monitors

Trust: 1.98

sources: NVD: CVE-2017-12223 // JVNDB: JVNDB-2017-007986 // BID: 100689 // VULHUB: VHN-102724

AFFECTED PRODUCTS

vendor:ciscomodel:ir800 integrated services routerscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:ir800 integrated services router softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:ir800 integrated services router softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 15.6 tscope: - version: -

Trust: 0.3

vendor:ciscomodel:ios 15.7 otscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.7 mscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.6 mscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios 15.6 m1scope:neversion: -

Trust: 0.3

sources: BID: 100689 // JVNDB: JVNDB-2017-007986 // CNNVD: CNNVD-201709-226 // NVD: CVE-2017-12223

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12223
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-12223
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201709-226
value: MEDIUM

Trust: 0.6

VULHUB: VHN-102724
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2017-12223
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-102724
severity: MEDIUM
baseScore: 6.9
vectorString: AV:L/AC:M/AU:N/C:C/I:C/A:C
accessVector: LOCAL
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 3.4
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12223
baseSeverity: MEDIUM
baseScore: 6.4
vectorString: CVSS:3.0/AV:P/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: PHYSICAL
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 0.5
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-102724 // JVNDB: JVNDB-2017-007986 // CNNVD: CNNVD-201709-226 // NVD: CVE-2017-12223

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-102724 // JVNDB: JVNDB-2017-007986 // NVD: CVE-2017-12223

THREAT TYPE

local

Trust: 0.9

sources: BID: 100689 // CNNVD: CNNVD-201709-226

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 100689 // CNNVD: CNNVD-201709-226

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-007986

PATCH

title:cisco-sa-20170906-isrurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-isr

Trust: 0.8

title:Cisco IR800 Integrated Services Router Software Enter the fix for the verification vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=74580

Trust: 0.6

sources: JVNDB: JVNDB-2017-007986 // CNNVD: CNNVD-201709-226

EXTERNAL IDS

db:NVDid:CVE-2017-12223

Trust: 2.8

db:BIDid:100689

Trust: 2.0

db:SECTRACKid:1039275

Trust: 1.7

db:JVNDBid:JVNDB-2017-007986

Trust: 0.8

db:CNNVDid:CNNVD-201709-226

Trust: 0.7

db:VULHUBid:VHN-102724

Trust: 0.1

sources: VULHUB: VHN-102724 // BID: 100689 // JVNDB: JVNDB-2017-007986 // CNNVD: CNNVD-201709-226 // NVD: CVE-2017-12223

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20170906-isr

Trust: 2.0

url:http://www.securityfocus.com/bid/100689

Trust: 1.7

url:http://www.securitytracker.com/id/1039275

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12223

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12223

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-102724 // BID: 100689 // JVNDB: JVNDB-2017-007986 // CNNVD: CNNVD-201709-226 // NVD: CVE-2017-12223

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 100689

SOURCES

db:VULHUBid:VHN-102724
db:BIDid:100689
db:JVNDBid:JVNDB-2017-007986
db:CNNVDid:CNNVD-201709-226
db:NVDid:CVE-2017-12223

LAST UPDATE DATE

2025-04-20T23:19:51.391000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-102724date:2019-10-09T00:00:00
db:BIDid:100689date:2017-09-06T00:00:00
db:JVNDBid:JVNDB-2017-007986date:2017-10-05T00:00:00
db:CNNVDid:CNNVD-201709-226date:2019-10-17T00:00:00
db:NVDid:CVE-2017-12223date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-102724date:2017-09-07T00:00:00
db:BIDid:100689date:2017-09-06T00:00:00
db:JVNDBid:JVNDB-2017-007986date:2017-10-05T00:00:00
db:CNNVDid:CNNVD-201709-226date:2017-09-12T00:00:00
db:NVDid:CVE-2017-12223date:2017-09-07T21:29:00.520