CVE-2017-3867
Published Mar 17, 2017
Last updated a year ago
Overview
- Description
- A vulnerability in the Border Gateway Protocol (BGP) Bidirectional Forwarding Detection (BFD) implementation of Cisco Adaptive Security Appliance (ASA) Software could allow an unauthenticated, remote attacker to bypass the access control list (ACL) for specific TCP and UDP traffic. More Information: CSCvc68229. Known Affected Releases: 9.6(2). Known Fixed Releases: 99.1(20.1) 99.1(10.2) 98.1(12.7) 98.1(1.49) 97.1(6.58) 97.1(0.134) 96.2(0.109) 9.7(1.1) 9.6(2.99) 9.6(2.8).
- Source
- ykramarz@cisco.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.0
- Type
- Primary
- Base score
- 5.3
- Impact score
- 1.4
- Exploitability score
- 3.9
- Vector string
- CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 5
- Impact score
- 2.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-287
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:6.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E4014494-E1EA-422E-8717-9EECA869F6A0" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "339ACF13-0E1F-48D6-9939-96B16AE857CE" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D5D09C9-4559-4FED-B4B7-EAE5935EBCEE" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "074A5E58-A066-470B-840A-1148A8979DFA" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FEF2C556-48E6-4572-8FD9-4DC8BAD90B90" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDAD792D-70DB-4123-8BCC-B6890A9BCAA8" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7425B1F7-FB7B-4B5B-9713-015D2101C319" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.2.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F3FB1712-7D75-43A7-A7BC-30AA73265E1D" }, { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:9.6.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05E59B31-CBCB-46BC-A2CE-98754FC8C36B" } ], "operator": "OR" }, { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:cisco:adaptive_security_appliance_software:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "8F7FDABB-8C67-4E56-A533-233B50047603" } ], "operator": "OR" } ], "operator": "AND" } ]