CVE-2017-12237 (CNNVD-201709-1297)

HIGH
中文标题:
Cisco IOS和IOS XE Internet Key Exchange模块资源管理错误漏洞
英文标题:
A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6...
CVSS分数: 7.5
发布时间: 2017-09-28 07:00:00
漏洞类型: 资源管理错误
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Cisco IOS和IOS XE都是美国思科(Cisco)公司为其网络设备开发的操作系统。Internet Key Exchange Version 2 (IKEv2) module是其中的一个密钥交换协议模块。 Cisco IOS 15.0版本至15.6版本和IOS XE 3.5版本至16.5版本中的IKEv2模块存在资源管理错误漏洞。远程攻击者可通过向受影响的设备发送特定的IKEv2数据包利用该漏洞造成拒绝服务(CPU大量消耗和设备重新加载)。

英文描述:

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS 15.0 through 15.6 and Cisco IOS XE 3.5 through 16.5 could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to how an affected device processes certain IKEv2 packets. An attacker could exploit this vulnerability by sending specific IKEv2 packets to an affected device to be processed. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. This vulnerability affects Cisco devices that have the Internet Security Association and Key Management Protocol (ISAKMP) enabled. Although only IKEv2 packets can be used to trigger this vulnerability, devices that are running Cisco IOS Software or Cisco IOS XE Software are vulnerable when ISAKMP is enabled. A device does not need to be configured with any IKEv2-specific features to be vulnerable. Many features use IKEv2, including different types of VPNs such as the following: LAN-to-LAN VPN; Remote-access VPN, excluding SSL VPN; Dynamic Multipoint VPN (DMVPN); and FlexVPN. Cisco Bug IDs: CSCvc41277.

CWE类型:
CWE-399
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
cisco ios * - - cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
cisco ios_xe * - - cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
无标题 x_refsource_CONFIRM
cve.org
访问
1039460 vdb-entry
cve.org
访问
101037 vdb-entry
cve.org
访问
134c704f-9b21-4f2e-91b3-4a467353bcc0 OTHER
nvd.nist.gov
访问
CVSS评分详情
7.5
HIGH
CVSS向量: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS版本: 3.1
机密性
NONE
完整性
NONE
可用性
HIGH
时间信息
发布时间:
2017-09-28 07:00:00
修改时间:
2025-10-21 23:55:32
创建时间:
2025-11-11 15:34:33
更新时间:
2025-11-11 15:53:15
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2017-12237 2025-11-11 15:19:17 2025-11-11 07:34:33
NVD nvd_CVE-2017-12237 2025-11-11 14:55:32 2025-11-11 07:43:12
CNNVD cnnvd_CNNVD-201709-1297 2025-11-11 15:09:53 2025-11-11 07:53:15
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:53:15
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-201709-1297; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 资源管理错误
  • cnnvd_id: 未提取 -> CNNVD-201709-1297
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:43:12
severity: SeverityLevel.MEDIUM → SeverityLevel.HIGH; cvss_score: 未提取 → 7.5; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 0 → 2; references_count: 3 → 4; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
  • cvss_score: 未提取 -> 7.5
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 0 -> 2
  • references_count: 3 -> 4
  • data_sources: ['cve'] -> ['cve', 'nvd']