CVE-2017-6742 (GCVE-0-2017-6742)
Vulnerability from cvelistv5
Published
2017-07-17 21:00
Modified
2025-10-21 23:55
Severity ?
VLAI Severity ?
EPSS score ?
Summary
A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.
The vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.
Only traffic directed to the affected system can be used to exploit this vulnerability.
References
Impacted products
| Vendor | Product | Version | |||||||
|---|---|---|---|---|---|---|---|---|---|
| ► | Cisco | Cisco IOS XE Software |
Version: 3.7.0S Version: 3.7.1S Version: 3.7.2S Version: 3.7.3S Version: 3.7.4S Version: 3.7.5S Version: 3.7.6S Version: 3.7.7S Version: 3.7.4aS Version: 3.7.2tS Version: 3.7.0bS Version: 3.8.0S Version: 3.8.1S Version: 3.8.2S Version: 3.9.1S Version: 3.9.0S Version: 3.9.2S Version: 3.9.0aS Version: 3.11.1S Version: 3.11.2S Version: 3.11.0S Version: 3.11.3S Version: 3.11.4S Version: 3.12.0S Version: 3.12.1S Version: 3.12.2S Version: 3.12.3S Version: 3.12.0aS Version: 3.12.4S Version: 3.13.0S Version: 3.13.1S Version: 3.13.2S Version: 3.13.3S Version: 3.13.4S Version: 3.13.5S Version: 3.13.2aS Version: 3.13.0aS Version: 3.13.5aS Version: 3.13.6S Version: 3.13.7S Version: 3.13.6aS Version: 3.13.7aS Version: 3.6.3E Version: 3.6.6E Version: 3.6.5bE Version: 3.14.0S Version: 3.14.1S Version: 3.14.2S Version: 3.14.3S Version: 3.14.4S Version: 3.15.0S Version: 3.15.1S Version: 3.15.2S Version: 3.15.1cS Version: 3.15.3S Version: 3.15.4S Version: 3.7.4E Version: 3.7.5E Version: 3.16.0S Version: 3.16.1S Version: 3.16.1aS Version: 3.16.2S Version: 3.16.0cS Version: 3.16.3S Version: 3.16.2bS Version: 3.16.4aS Version: 3.16.4bS Version: 3.16.5S Version: 3.16.4dS Version: 3.17.0S Version: 3.17.1S Version: 3.17.2S Version: 3.17.1aS Version: 3.17.3S Version: 16.2.1 Version: 16.2.2 Version: 16.3.1 Version: 16.3.2 Version: 16.3.3 Version: 16.3.1a Version: 16.3.4 Version: 16.4.1 Version: 16.4.2 Version: 16.5.1 Version: 16.5.1b Version: 3.18.0aS Version: 3.18.0S Version: 3.18.1S Version: 3.18.0SP Version: 3.18.1SP Version: 3.18.1aSP Version: 3.18.2aSP |
||||||
|
|||||||||
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog
Date added: 2023-04-19
Due date: 2023-05-10
Required action: Apply updates per vendor instructions.
Used in ransomware: Unknown
Notes: https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp; https://nvd.nist.gov/vuln/detail/CVE-2017-6742
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T15:41:17.132Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "99345",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/99345"
},
{
"name": "1038808",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1038808"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2017-6742",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-11-08T17:35:28.397376Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2023-04-19",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-6742"
},
"type": "kev"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:55:37.103Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-6742"
}
],
"timeline": [
{
"lang": "en",
"time": "2023-04-19T00:00:00+00:00",
"value": "CVE-2017-6742 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE Software",
"vendor": "Cisco",
"versions": [
{
"status": "affected",
"version": "3.7.0S"
},
{
"status": "affected",
"version": "3.7.1S"
},
{
"status": "affected",
"version": "3.7.2S"
},
{
"status": "affected",
"version": "3.7.3S"
},
{
"status": "affected",
"version": "3.7.4S"
},
{
"status": "affected",
"version": "3.7.5S"
},
{
"status": "affected",
"version": "3.7.6S"
},
{
"status": "affected",
"version": "3.7.7S"
},
{
"status": "affected",
"version": "3.7.4aS"
},
{
"status": "affected",
"version": "3.7.2tS"
},
{
"status": "affected",
"version": "3.7.0bS"
},
{
"status": "affected",
"version": "3.8.0S"
},
{
"status": "affected",
"version": "3.8.1S"
},
{
"status": "affected",
"version": "3.8.2S"
},
{
"status": "affected",
"version": "3.9.1S"
},
{
"status": "affected",
"version": "3.9.0S"
},
{
"status": "affected",
"version": "3.9.2S"
},
{
"status": "affected",
"version": "3.9.0aS"
},
{
"status": "affected",
"version": "3.11.1S"
},
{
"status": "affected",
"version": "3.11.2S"
},
{
"status": "affected",
"version": "3.11.0S"
},
{
"status": "affected",
"version": "3.11.3S"
},
{
"status": "affected",
"version": "3.11.4S"
},
{
"status": "affected",
"version": "3.12.0S"
},
{
"status": "affected",
"version": "3.12.1S"
},
{
"status": "affected",
"version": "3.12.2S"
},
{
"status": "affected",
"version": "3.12.3S"
},
{
"status": "affected",
"version": "3.12.0aS"
},
{
"status": "affected",
"version": "3.12.4S"
},
{
"status": "affected",
"version": "3.13.0S"
},
{
"status": "affected",
"version": "3.13.1S"
},
{
"status": "affected",
"version": "3.13.2S"
},
{
"status": "affected",
"version": "3.13.3S"
},
{
"status": "affected",
"version": "3.13.4S"
},
{
"status": "affected",
"version": "3.13.5S"
},
{
"status": "affected",
"version": "3.13.2aS"
},
{
"status": "affected",
"version": "3.13.0aS"
},
{
"status": "affected",
"version": "3.13.5aS"
},
{
"status": "affected",
"version": "3.13.6S"
},
{
"status": "affected",
"version": "3.13.7S"
},
{
"status": "affected",
"version": "3.13.6aS"
},
{
"status": "affected",
"version": "3.13.7aS"
},
{
"status": "affected",
"version": "3.6.3E"
},
{
"status": "affected",
"version": "3.6.6E"
},
{
"status": "affected",
"version": "3.6.5bE"
},
{
"status": "affected",
"version": "3.14.0S"
},
{
"status": "affected",
"version": "3.14.1S"
},
{
"status": "affected",
"version": "3.14.2S"
},
{
"status": "affected",
"version": "3.14.3S"
},
{
"status": "affected",
"version": "3.14.4S"
},
{
"status": "affected",
"version": "3.15.0S"
},
{
"status": "affected",
"version": "3.15.1S"
},
{
"status": "affected",
"version": "3.15.2S"
},
{
"status": "affected",
"version": "3.15.1cS"
},
{
"status": "affected",
"version": "3.15.3S"
},
{
"status": "affected",
"version": "3.15.4S"
},
{
"status": "affected",
"version": "3.7.4E"
},
{
"status": "affected",
"version": "3.7.5E"
},
{
"status": "affected",
"version": "3.16.0S"
},
{
"status": "affected",
"version": "3.16.1S"
},
{
"status": "affected",
"version": "3.16.1aS"
},
{
"status": "affected",
"version": "3.16.2S"
},
{
"status": "affected",
"version": "3.16.0cS"
},
{
"status": "affected",
"version": "3.16.3S"
},
{
"status": "affected",
"version": "3.16.2bS"
},
{
"status": "affected",
"version": "3.16.4aS"
},
{
"status": "affected",
"version": "3.16.4bS"
},
{
"status": "affected",
"version": "3.16.5S"
},
{
"status": "affected",
"version": "3.16.4dS"
},
{
"status": "affected",
"version": "3.17.0S"
},
{
"status": "affected",
"version": "3.17.1S"
},
{
"status": "affected",
"version": "3.17.2S"
},
{
"status": "affected",
"version": "3.17.1aS"
},
{
"status": "affected",
"version": "3.17.3S"
},
{
"status": "affected",
"version": "16.2.1"
},
{
"status": "affected",
"version": "16.2.2"
},
{
"status": "affected",
"version": "16.3.1"
},
{
"status": "affected",
"version": "16.3.2"
},
{
"status": "affected",
"version": "16.3.3"
},
{
"status": "affected",
"version": "16.3.1a"
},
{
"status": "affected",
"version": "16.3.4"
},
{
"status": "affected",
"version": "16.4.1"
},
{
"status": "affected",
"version": "16.4.2"
},
{
"status": "affected",
"version": "16.5.1"
},
{
"status": "affected",
"version": "16.5.1b"
},
{
"status": "affected",
"version": "3.18.0aS"
},
{
"status": "affected",
"version": "3.18.0S"
},
{
"status": "affected",
"version": "3.18.1S"
},
{
"status": "affected",
"version": "3.18.0SP"
},
{
"status": "affected",
"version": "3.18.1SP"
},
{
"status": "affected",
"version": "3.18.1aSP"
},
{
"status": "affected",
"version": "3.18.2aSP"
}
]
},
{
"product": "Universal Product",
"vendor": "IntelliShield",
"versions": [
{
"status": "affected",
"version": "N/A"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.\u0026nbsp;\r\n\r\n\r\n\r\nThe vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.\r\n\r\n\r\n\r\nOnly traffic directed to the affected system can be used to exploit this vulnerability."
}
],
"exploits": [
{
"lang": "en",
"value": "At the time of initial publication, Cisco was aware of external knowledge of the vulnerabilities described in this advisory and, as a precaution, notified customers about the potential for exploitation.\r\n\r\nOn January 6, 2017, a security researcher published functional exploit code for these vulnerabilities.\r\n\r\nThe Cisco Product Security Incident Response Team (PSIRT) is aware of exploitation of the following vulnerabilities that are described in this advisory:\r\n\r\nCVE-2017-6736\r\nCVE-2017-6737\r\nCVE-2017-6738\r\nCVE-2017-6739\r\nCVE-2017-6740\r\nCVE-2017-6742\r\nCVE-2017-6743\r\nCVE-2017-6744\r\n\r\nThe Cisco PSIRT is aware of exploit code available for CVE-2017-6741.\r\n\r\nAdditional information can be found at Cisco TALOS: DNS Hijacking Abuses Trust In Core Internet Service [\"https://blog.talosintelligence.com/2019/04/seaturtle.html\"]."
}
],
"metrics": [
{
"cvssV3_0": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 8.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.0"
},
"format": "cvssV3_0"
}
],
"providerMetadata": {
"dateUpdated": "2025-07-31T16:24:06.252Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "cisco-sa-20170629-snmp",
"url": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp"
}
],
"source": {
"advisory": "cisco-sa-20170629-snmp",
"defects": [
"CSCve54313"
],
"discovery": "UNKNOWN"
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2017-6742",
"datePublished": "2017-07-17T21:00:00.000Z",
"dateReserved": "2017-03-09T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:55:37.103Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2017-6742",
"cwes": "[\"CWE-119\"]",
"dateAdded": "2023-04-19",
"dueDate": "2023-05-10",
"knownRansomwareCampaignUse": "Unknown",
"notes": "https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp; https://nvd.nist.gov/vuln/detail/CVE-2017-6742",
"product": "IOS and IOS XE Software",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "The Simple Network Management Protocol (SNMP) subsystem of Cisco IOS and IOS XE contains a vulnerability that could allow an authenticated, remote attacker to remotely execute code on an affected system or cause an affected system to reload.",
"vendorProject": "Cisco",
"vulnerabilityName": "Cisco IOS and IOS XE Software SNMP Remote Code Execution Vulnerability"
},
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.securityfocus.com/bid/99345\", \"name\": \"99345\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1038808\", \"name\": \"1038808\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T15:41:17.132Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-6742\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-11-08T17:35:28.397376Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2023-04-19\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-6742\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2023-04-19T00:00:00+00:00\", \"value\": \"CVE-2017-6742 added to CISA KEV\"}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-11-08T16:07:09.441Z\"}}], \"cna\": {\"source\": {\"defects\": [\"CSCve54313\"], \"advisory\": \"cisco-sa-20170629-snmp\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"cvssV3_0\", \"cvssV3_0\": {\"scope\": \"UNCHANGED\", \"version\": \"3.0\", \"baseScore\": 8.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"HIGH\"}}], \"affected\": [{\"vendor\": \"Cisco\", \"product\": \"Cisco IOS XE Software\", \"versions\": [{\"status\": \"affected\", \"version\": \"3.7.0S\"}, {\"status\": \"affected\", \"version\": \"3.7.1S\"}, {\"status\": \"affected\", \"version\": \"3.7.2S\"}, {\"status\": \"affected\", \"version\": \"3.7.3S\"}, {\"status\": \"affected\", \"version\": \"3.7.4S\"}, {\"status\": \"affected\", \"version\": \"3.7.5S\"}, {\"status\": \"affected\", \"version\": \"3.7.6S\"}, {\"status\": \"affected\", \"version\": \"3.7.7S\"}, {\"status\": \"affected\", \"version\": \"3.7.4aS\"}, {\"status\": \"affected\", \"version\": \"3.7.2tS\"}, {\"status\": \"affected\", \"version\": \"3.7.0bS\"}, {\"status\": \"affected\", \"version\": \"3.8.0S\"}, {\"status\": \"affected\", \"version\": \"3.8.1S\"}, {\"status\": \"affected\", \"version\": \"3.8.2S\"}, {\"status\": \"affected\", \"version\": \"3.9.1S\"}, {\"status\": \"affected\", \"version\": \"3.9.0S\"}, {\"status\": \"affected\", \"version\": \"3.9.2S\"}, {\"status\": \"affected\", \"version\": \"3.9.0aS\"}, {\"status\": \"affected\", \"version\": \"3.11.1S\"}, {\"status\": \"affected\", \"version\": \"3.11.2S\"}, {\"status\": \"affected\", \"version\": \"3.11.0S\"}, {\"status\": \"affected\", \"version\": \"3.11.3S\"}, {\"status\": \"affected\", \"version\": \"3.11.4S\"}, {\"status\": \"affected\", \"version\": \"3.12.0S\"}, {\"status\": \"affected\", \"version\": \"3.12.1S\"}, {\"status\": \"affected\", \"version\": \"3.12.2S\"}, {\"status\": \"affected\", \"version\": \"3.12.3S\"}, {\"status\": \"affected\", \"version\": \"3.12.0aS\"}, {\"status\": \"affected\", \"version\": \"3.12.4S\"}, {\"status\": \"affected\", \"version\": \"3.13.0S\"}, {\"status\": \"affected\", \"version\": \"3.13.1S\"}, {\"status\": \"affected\", \"version\": \"3.13.2S\"}, {\"status\": \"affected\", \"version\": \"3.13.3S\"}, {\"status\": \"affected\", \"version\": \"3.13.4S\"}, {\"status\": \"affected\", \"version\": \"3.13.5S\"}, {\"status\": \"affected\", \"version\": \"3.13.2aS\"}, {\"status\": \"affected\", \"version\": \"3.13.0aS\"}, {\"status\": \"affected\", \"version\": \"3.13.5aS\"}, {\"status\": \"affected\", \"version\": \"3.13.6S\"}, {\"status\": \"affected\", \"version\": \"3.13.7S\"}, {\"status\": \"affected\", \"version\": \"3.13.6aS\"}, {\"status\": \"affected\", \"version\": \"3.13.7aS\"}, {\"status\": \"affected\", \"version\": \"3.6.3E\"}, {\"status\": \"affected\", \"version\": \"3.6.6E\"}, {\"status\": \"affected\", \"version\": \"3.6.5bE\"}, {\"status\": \"affected\", \"version\": \"3.14.0S\"}, {\"status\": \"affected\", \"version\": \"3.14.1S\"}, {\"status\": \"affected\", \"version\": \"3.14.2S\"}, {\"status\": \"affected\", \"version\": \"3.14.3S\"}, {\"status\": \"affected\", \"version\": \"3.14.4S\"}, {\"status\": \"affected\", \"version\": \"3.15.0S\"}, {\"status\": \"affected\", \"version\": \"3.15.1S\"}, {\"status\": \"affected\", \"version\": \"3.15.2S\"}, {\"status\": \"affected\", \"version\": \"3.15.1cS\"}, {\"status\": \"affected\", \"version\": \"3.15.3S\"}, {\"status\": \"affected\", \"version\": \"3.15.4S\"}, {\"status\": \"affected\", \"version\": \"3.7.4E\"}, {\"status\": \"affected\", \"version\": \"3.7.5E\"}, {\"status\": \"affected\", \"version\": \"3.16.0S\"}, {\"status\": \"affected\", \"version\": \"3.16.1S\"}, {\"status\": \"affected\", \"version\": \"3.16.1aS\"}, {\"status\": \"affected\", \"version\": \"3.16.2S\"}, {\"status\": \"affected\", \"version\": \"3.16.0cS\"}, {\"status\": \"affected\", \"version\": \"3.16.3S\"}, {\"status\": \"affected\", \"version\": \"3.16.2bS\"}, {\"status\": \"affected\", \"version\": \"3.16.4aS\"}, {\"status\": \"affected\", \"version\": \"3.16.4bS\"}, {\"status\": \"affected\", \"version\": \"3.16.5S\"}, {\"status\": \"affected\", \"version\": \"3.16.4dS\"}, {\"status\": \"affected\", \"version\": \"3.17.0S\"}, {\"status\": \"affected\", \"version\": \"3.17.1S\"}, {\"status\": \"affected\", \"version\": \"3.17.2S\"}, {\"status\": \"affected\", \"version\": \"3.17.1aS\"}, {\"status\": \"affected\", \"version\": \"3.17.3S\"}, {\"status\": \"affected\", \"version\": \"16.2.1\"}, {\"status\": \"affected\", \"version\": \"16.2.2\"}, {\"status\": \"affected\", \"version\": \"16.3.1\"}, {\"status\": \"affected\", \"version\": \"16.3.2\"}, {\"status\": \"affected\", \"version\": \"16.3.3\"}, {\"status\": \"affected\", \"version\": \"16.3.1a\"}, {\"status\": \"affected\", \"version\": \"16.3.4\"}, {\"status\": \"affected\", \"version\": \"16.4.1\"}, {\"status\": \"affected\", \"version\": \"16.4.2\"}, {\"status\": \"affected\", \"version\": \"16.5.1\"}, {\"status\": \"affected\", \"version\": \"16.5.1b\"}, {\"status\": \"affected\", \"version\": \"3.18.0aS\"}, {\"status\": \"affected\", \"version\": \"3.18.0S\"}, {\"status\": \"affected\", \"version\": \"3.18.1S\"}, {\"status\": \"affected\", \"version\": \"3.18.0SP\"}, {\"status\": \"affected\", \"version\": \"3.18.1SP\"}, {\"status\": \"affected\", \"version\": \"3.18.1aSP\"}, {\"status\": \"affected\", \"version\": \"3.18.2aSP\"}]}, {\"vendor\": \"IntelliShield\", \"product\": \"Universal Product\", \"versions\": [{\"status\": \"affected\", \"version\": \"N/A\"}]}], \"exploits\": [{\"lang\": \"en\", \"value\": \"At the time of initial publication, Cisco was aware of external knowledge of the vulnerabilities described in this advisory and, as a precaution, notified customers about the potential for exploitation.\\r\\n\\r\\nOn January 6, 2017, a security researcher published functional exploit code for these vulnerabilities.\\r\\n\\r\\nThe Cisco Product Security Incident Response Team (PSIRT) is aware of exploitation of the following vulnerabilities that are described in this advisory:\\r\\n\\r\\nCVE-2017-6736\\r\\nCVE-2017-6737\\r\\nCVE-2017-6738\\r\\nCVE-2017-6739\\r\\nCVE-2017-6740\\r\\nCVE-2017-6742\\r\\nCVE-2017-6743\\r\\nCVE-2017-6744\\r\\n\\r\\nThe Cisco PSIRT is aware of exploit code available for CVE-2017-6741.\\r\\n\\r\\nAdditional information can be found at Cisco TALOS: DNS Hijacking Abuses Trust In Core Internet Service [\\\"https://blog.talosintelligence.com/2019/04/seaturtle.html\\\"].\"}], \"references\": [{\"url\": \"https://sec.cloudapps.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170629-snmp\", \"name\": \"cisco-sa-20170629-snmp\"}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the SNMP implementation of could allow an authenticated, remote attacker to cause a reload of the affected system or to remotely execute code. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the affected device.\u0026nbsp;\\r\\n\\r\\n\\r\\n\\r\\nThe vulnerability is due to a buffer overflow in the affected code area. The vulnerability affects all versions of SNMP (versions 1, 2c, and 3). The attacker must know the SNMP read only community string (SNMP version 2c or earlier) or the user credentials (SNMPv3). An exploit could allow the attacker to execute arbitrary code and obtain full control of the system or to cause a reload of the affected system.\\r\\n\\r\\n\\r\\n\\r\\nOnly traffic directed to the affected system can be used to exploit this vulnerability.\"}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2025-07-31T16:24:06.252Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2017-6742\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-07-31T16:24:06.252Z\", \"dateReserved\": \"2017-03-09T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2017-07-17T21:00:00.000Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…