Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2017-12217

EPSS 0.55% · P68
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2017-12217

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A vulnerability in the General Packet Radio Service (GPRS) Tunneling Protocol ingress packet handler of Cisco ASR 5500 System Architecture Evolution (SAE) Gateways could allow an unauthenticated, remote attacker to cause a partial denial of service (DoS) condition on an affected device. The vulnerability is due to improper input validation of GPRS Tunneling Protocol packet headers. An attacker could exploit this vulnerability by sending a malformed GPRS Tunneling Protocol packet to an affected device. A successful exploit could allow the attacker to cause the GTPUMGR process on an affected device to restart unexpectedly, resulting in a partial DoS condition. If the GTPUMGR process restarts, there could be a brief impact on traffic passing through the device. Cisco Bug IDs: CSCve07119.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Cisco ASR 5500 System Architecture Evolution Gateways 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Cisco ASR 5500 System Architecture Evolution (SAE) Gateways是美国思科(Cisco)公司的一款网关设备。General Packet Radio Service (GPRS) Tunneling Protocol ingress packet handler是其中的一个通用分组无线业务通道协议入口包处理程序。 Cisco ASR 5500 SAE Gateways中的GPRS Tunneling Protocol ingress packet ha
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Cisco ASR 5500 System Architecture Evolution Gateway Cisco ASR 5500 System Architecture Evolution Gateway -

II. Public POCs for CVE-2017-12217

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2017-12217

登录查看更多情报信息。

Same Patch Batch · n/a · 2017-09-07 · 77 CVEs total

CVE-2015-1590kamailio 安全漏洞
CVE-2017-9458Palo Alto Networks PAN-OS 安全漏洞
CVE-2015-3442Soreco Xpert.Line 安全漏洞
CVE-2015-3250Apache Directory LDAP API 信息泄露漏洞
CVE-2016-10405D-Link DIR-600L 安全漏洞
CVE-2017-9834WordPress WatuPRO插件SQL注入漏洞
CVE-2017-9779OCaml compiler 安全漏洞
CVE-2017-14147FiberHome User End Routers Bearing AN1020-25 安全漏洞
CVE-2017-12912MP3Gain 缓冲区错误漏洞
CVE-2017-12911MP3Gain 安全漏洞
CVE-2016-0732Pivotal Cloud Foundry和UAA 权限许可和访问控制问题漏洞
CVE-2017-1502IBM Content Navigator 跨站脚本漏洞
CVE-2017-14181mp4tools aacplusenc 安全漏洞
CVE-2017-1189IBM WebSphere Portal和Web Content Manager 跨站脚本漏洞
CVE-2017-1098IBM Emptoris Supplier Lifecycle Management 跨站脚本漏洞
CVE-2013-7428Joomla! Googlemaps插件安全漏洞
CVE-2017-14195dayrui FineCms 跨站脚本漏洞
CVE-2017-14194dayrui FineCms 跨站脚本漏洞
CVE-2017-14193dayrui FineCms 跨站脚本漏洞
CVE-2017-14192dayrui FineCms 跨站脚本漏洞

Showing top 20 of 77 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2017-12217

No comments yet


Leave a comment