Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2017-6633

Опубликовано: 22 мая 2017
Источник: nvd
CVSS3: 7.5
CVSS2: 5
EPSS Низкий

Описание

A vulnerability in the TCP throttling process of Cisco UCS C-Series Rack Servers 3.0(0.234) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient rate-limiting protection. An attacker could exploit this vulnerability by sending a high rate of TCP SYN packets to a specific TCP listening port on an affected device. An exploit could allow the attacker to cause a specific TCP listening port to stop accepting new connections, resulting in a DoS condition. Cisco Bug IDs: CSCva65544.

Уязвимые конфигурации

Конфигурация 1

Одновременно

cpe:2.3:a:cisco:unified_computing_system:3.0\(0.234\):*:*:*:*:*:*:*

Одно из

cpe:2.3:h:cisco:ucs_c220_m4_rack_server:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_c240_m4_rack_server:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_c3160_rack_server:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:ucs_c460_m4_rack_server:-:*:*:*:*:*:*:*

EPSS

Процентиль: 73%
0.0075
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-119
CWE-119

Связанные уязвимости

CVSS3: 7.5
github
больше 3 лет назад

A vulnerability in the TCP throttling process of Cisco UCS C-Series Rack Servers 3.0(0.234) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient rate-limiting protection. An attacker could exploit this vulnerability by sending a high rate of TCP SYN packets to a specific TCP listening port on an affected device. An exploit could allow the attacker to cause a specific TCP listening port to stop accepting new connections, resulting in a DoS condition. Cisco Bug IDs: CSCva65544.

EPSS

Процентиль: 73%
0.0075
Низкий

7.5 High

CVSS3

5 Medium

CVSS2

Дефекты

CWE-119
CWE-119