TCP Connection Handling Vulnerability in Cisco Remote Expert Manager Software
CVE-2017-6641

7.5HIGH

Key Information:

Vendor
Cisco
Vendor
CVE Published:
22 May 2017

Summary

A vulnerability in the TCP connection handling of Cisco Remote Expert Manager Software version 11.0.0 allows an unauthenticated remote attacker to launch a denial-of-service (DoS) attack by disabling TCP ports. Due to insufficient rate-limiting in the TCP Listen application, an attacker can flood the device with specifically crafted TCP packets, including those with the FIN bit set. This exploitation could lead to certain TCP listening ports on the system ceasing to accept connections for an extended period, or until the device is restarted. Additionally, such an attack may exhaust system resources like CPU and memory.

Affected Version(s)

Cisco Remote Expert Manager Cisco Remote Expert Manager

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.