ID

VAR-201710-0635


CVE

CVE-2017-12256


TITLE

Cisco Wide Area Application Services Appliance data processing vulnerabilities

Trust: 0.8

sources: JVNDB: JVNDB-2017-008863

DESCRIPTION

A vulnerability in the Akamai Connect feature of Cisco Wide Area Application Services (WAAS) Appliances could allow an unauthenticated, remote attacker to cause a denial-of-service (DoS) condition on an affected device. The vulnerability is due to certain file-handling inefficiencies of the affected system. An attacker could exploit this vulnerability by directing client systems to access a corrupted file that the client systems cannot decompress correctly. A successful exploit could allow the attacker to cause the affected device to crash or hang unexpectedly and result in a DoS condition that may require manual intervention to regain normal operating conditions. Cisco Bug IDs: CSCve82472. Vendors have confirmed this vulnerability Bug ID CSCve82472 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. An attacker can exploit this issue to cause a denial-of-service condition, denying service to legitimate users. This software is mainly used in the link environment with small bandwidth and large delay

Trust: 1.98

sources: NVD: CVE-2017-12256 // JVNDB: JVNDB-2017-008863 // BID: 101180 // VULHUB: VHN-102760

AFFECTED PRODUCTS

vendor:ciscomodel:wide area application servicesscope:eqversion: -

Trust: 1.6

vendor:ciscomodel:wide area application services softwarescope: - version: -

Trust: 0.8

vendor:ciscomodel:wide area application services appliances 6.2scope: - version: -

Trust: 0.3

vendor:ciscomodel:wide area application servicesscope:eqversion:0

Trust: 0.3

sources: BID: 101180 // JVNDB: JVNDB-2017-008863 // CNNVD: CNNVD-201710-058 // NVD: CVE-2017-12256

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2017-12256
value: MEDIUM

Trust: 1.0

NVD: CVE-2017-12256
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201710-058
value: MEDIUM

Trust: 0.6

VULHUB: VHN-102760
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2017-12256
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-102760
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2017-12256
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 2.8
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-102760 // JVNDB: JVNDB-2017-008863 // CNNVD: CNNVD-201710-058 // NVD: CVE-2017-12256

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

problemtype:CWE-399

Trust: 1.0

problemtype:CWE-19

Trust: 0.9

sources: VULHUB: VHN-102760 // JVNDB: JVNDB-2017-008863 // NVD: CVE-2017-12256

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201710-058

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201710-058

CONFIGURATIONS

sources: JVNDB: JVNDB-2017-008863

PATCH

title:cisco-sa-20171004-waasurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171004-waas

Trust: 0.8

title:Cisco Wide Area Application Services Appliances Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=75273

Trust: 0.6

sources: JVNDB: JVNDB-2017-008863 // CNNVD: CNNVD-201710-058

EXTERNAL IDS

db:NVDid:CVE-2017-12256

Trust: 2.8

db:BIDid:101180

Trust: 2.0

db:JVNDBid:JVNDB-2017-008863

Trust: 0.8

db:CNNVDid:CNNVD-201710-058

Trust: 0.7

db:VULHUBid:VHN-102760

Trust: 0.1

sources: VULHUB: VHN-102760 // BID: 101180 // JVNDB: JVNDB-2017-008863 // CNNVD: CNNVD-201710-058 // NVD: CVE-2017-12256

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20171004-waas

Trust: 2.0

url:http://www.securityfocus.com/bid/101180

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2017-12256

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2017-12256

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:http://www.cisco.com/c/en/us/products/routers/wide-area-application-services/index.html

Trust: 0.3

sources: VULHUB: VHN-102760 // BID: 101180 // JVNDB: JVNDB-2017-008863 // CNNVD: CNNVD-201710-058 // NVD: CVE-2017-12256

CREDITS

Cisco

Trust: 0.3

sources: BID: 101180

SOURCES

db:VULHUBid:VHN-102760
db:BIDid:101180
db:JVNDBid:JVNDB-2017-008863
db:CNNVDid:CNNVD-201710-058
db:NVDid:CVE-2017-12256

LAST UPDATE DATE

2025-04-20T23:40:00.533000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-102760date:2019-10-09T00:00:00
db:BIDid:101180date:2017-10-04T00:00:00
db:JVNDBid:JVNDB-2017-008863date:2017-10-30T00:00:00
db:CNNVDid:CNNVD-201710-058date:2019-10-17T00:00:00
db:NVDid:CVE-2017-12256date:2025-04-20T01:37:25.860

SOURCES RELEASE DATE

db:VULHUBid:VHN-102760date:2017-10-05T00:00:00
db:BIDid:101180date:2017-10-04T00:00:00
db:JVNDBid:JVNDB-2017-008863date:2017-10-30T00:00:00
db:CNNVDid:CNNVD-201710-058date:2017-10-10T00:00:00
db:NVDid:CVE-2017-12256date:2017-10-05T07:29:00.403