Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2017-3881
Deferred
More InfoOfficial Page
Source-psirt@cisco.com
View Known Exploited Vulnerability (KEV) details
Published At-17 Mar, 2017 | 22:59
Updated At-12 Jan, 2026 | 21:15

A vulnerability in the Cisco Cluster Management Protocol (CMP) processing code in Cisco IOS and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a reload of an affected device or remotely execute code with elevated privileges. The Cluster Management Protocol utilizes Telnet internally as a signaling and command protocol between cluster members. The vulnerability is due to the combination of two factors: (1) the failure to restrict the use of CMP-specific Telnet options only to internal, local communications between cluster members and instead accept and process such options over any Telnet connection to an affected device; and (2) the incorrect processing of malformed CMP-specific Telnet options. An attacker could exploit this vulnerability by sending malformed CMP-specific Telnet options while establishing a Telnet session with an affected Cisco device configured to accept Telnet connections. An exploit could allow an attacker to execute arbitrary code and obtain full control of the device or cause a reload of the affected device. This affects Catalyst switches, Embedded Service 2020 switches, Enhanced Layer 2 EtherSwitch Service Module, Enhanced Layer 2/3 EtherSwitch Service Module, Gigabit Ethernet Switch Module (CGESM) for HP, IE Industrial Ethernet switches, ME 4924-10GE switch, RF Gateway 10, and SM-X Layer 2/3 EtherSwitch Service Module. Cisco Bug IDs: CSCvd48893.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
2022-03-252022-04-15Cisco IOS and IOS XE Remote Code Execution VulnerabilityApply updates per vendor instructions.
Date Added: 2022-03-25
Due Date: 2022-04-15
Vulnerability Name: Cisco IOS and IOS XE Remote Code Execution Vulnerability
Required Action: Apply updates per vendor instructions.
Metrics
TypeVersionBase scoreBase severityVector
Primary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Secondary3.19.8CRITICAL
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Primary2.010.0HIGH
AV:N/AC:L/Au:N/C:C/I:C/A:C
Type: Primary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 9.8
Base severity: CRITICAL
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 10.0
Base severity: HIGH
Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
CPE Matches

Cisco Systems, Inc.
cisco
>>ios>>Versions from 12.2s(inclusive) to 15.1\(3\)svs(inclusive)
cpe:2.3:o:cisco:ios:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>ios_xe>>Versions from 3.2sg(inclusive) to 3.9e(inclusive)
cpe:2.3:o:cisco:ios_xe:*:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2350-48td-s>>-
cpe:2.3:h:cisco:catalyst_2350-48td-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2350-48td-sd>>-
cpe:2.3:h:cisco:catalyst_2350-48td-sd:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2360-48td-s>>-
cpe:2.3:h:cisco:catalyst_2360-48td-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2918-24tc-c>>-
cpe:2.3:h:cisco:catalyst_2918-24tc-c:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2918-24tt-c>>-
cpe:2.3:h:cisco:catalyst_2918-24tt-c:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2918-48tc-c>>-
cpe:2.3:h:cisco:catalyst_2918-48tc-c:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2918-48tt-c>>-
cpe:2.3:h:cisco:catalyst_2918-48tt-c:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2928-24tc-c>>-
cpe:2.3:h:cisco:catalyst_2928-24tc-c:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-24-s>>-
cpe:2.3:h:cisco:catalyst_2960-24-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-24lc-s>>-
cpe:2.3:h:cisco:catalyst_2960-24lc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-24lt-l>>-
cpe:2.3:h:cisco:catalyst_2960-24lt-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-24pc-l>>-
cpe:2.3:h:cisco:catalyst_2960-24pc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-24pc-s>>-
cpe:2.3:h:cisco:catalyst_2960-24pc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-24tc-l>>-
cpe:2.3:h:cisco:catalyst_2960-24tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-24tc-s>>-
cpe:2.3:h:cisco:catalyst_2960-24tc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-24tt-l>>-
cpe:2.3:h:cisco:catalyst_2960-24tt-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-48pst-l>>-
cpe:2.3:h:cisco:catalyst_2960-48pst-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-48pst-s>>-
cpe:2.3:h:cisco:catalyst_2960-48pst-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-48tc-l>>-
cpe:2.3:h:cisco:catalyst_2960-48tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-48tc-s>>-
cpe:2.3:h:cisco:catalyst_2960-48tc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-48tt-l>>-
cpe:2.3:h:cisco:catalyst_2960-48tt-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-48tt-s>>-
cpe:2.3:h:cisco:catalyst_2960-48tt-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-8tc-l>>-
cpe:2.3:h:cisco:catalyst_2960-8tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-8tc-s>>-
cpe:2.3:h:cisco:catalyst_2960-8tc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24lc-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24lc-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24pc-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24pc-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24tc-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_24tc-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_48pst-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_48pst-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_48tc-l>>-
cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960-plus_48tc-s>>-
cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960c-12pc-l>>-
cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960c-8pc-l>>-
cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960c-8tc-l>>-
cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960c-8tc-s>>-
cpe:2.3:h:cisco:catalyst_2960c-8tc-s:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960cg-8tc-l>>-
cpe:2.3:h:cisco:catalyst_2960cg-8tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960cpd-8pt-l>>-
cpe:2.3:h:cisco:catalyst_2960cpd-8pt-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960cpd-8tt-l>>-
cpe:2.3:h:cisco:catalyst_2960cpd-8tt-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960cx-8pc-l>>-
cpe:2.3:h:cisco:catalyst_2960cx-8pc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960cx-8tc-l>>-
cpe:2.3:h:cisco:catalyst_2960cx-8tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960g-24tc-l>>-
cpe:2.3:h:cisco:catalyst_2960g-24tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960g-48tc-l>>-
cpe:2.3:h:cisco:catalyst_2960g-48tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960g-8tc-l>>-
cpe:2.3:h:cisco:catalyst_2960g-8tc-l:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960l-16ps-ll>>-
cpe:2.3:h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*
Cisco Systems, Inc.
cisco
>>catalyst_2960l-16ts-ll>>-
cpe:2.3:h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-20Primarynvd@nist.gov
CWE-20Secondary134c704f-9b21-4f2e-91b3-4a467353bcc0
CWE ID: CWE-20
Type: Primary
Source: nvd@nist.gov
CWE ID: CWE-20
Type: Secondary
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.securityfocus.com/bid/96960psirt@cisco.com
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/97391psirt@cisco.com
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1038059psirt@cisco.com
Third Party Advisory
VDB Entry
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmppsirt@cisco.com
Vendor Advisory
https://www.exploit-db.com/exploits/41872/psirt@cisco.com
Exploit
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/41874/psirt@cisco.com
Broken Link
http://www.securityfocus.com/bid/96960af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/97391af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
http://www.securitytracker.com/id/1038059af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
VDB Entry
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmpaf854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://www.exploit-db.com/exploits/41872/af854a3a-2127-422b-91ae-364da2661108
Exploit
Third Party Advisory
VDB Entry
https://www.exploit-db.com/exploits/41874/af854a3a-2127-422b-91ae-364da2661108
Broken Link
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-3881134c704f-9b21-4f2e-91b3-4a467353bcc0
N/A
Hyperlink: http://www.securityfocus.com/bid/96960
Source: psirt@cisco.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/97391
Source: psirt@cisco.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1038059
Source: psirt@cisco.com
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp
Source: psirt@cisco.com
Resource:
Vendor Advisory
Hyperlink: https://www.exploit-db.com/exploits/41872/
Source: psirt@cisco.com
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.exploit-db.com/exploits/41874/
Source: psirt@cisco.com
Resource:
Broken Link
Hyperlink: http://www.securityfocus.com/bid/96960
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securityfocus.com/bid/97391
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: http://www.securitytracker.com/id/1038059
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Third Party Advisory
VDB Entry
Hyperlink: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170317-cmp
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Vendor Advisory
Hyperlink: https://www.exploit-db.com/exploits/41872/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Exploit
Third Party Advisory
VDB Entry
Hyperlink: https://www.exploit-db.com/exploits/41874/
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Broken Link
Hyperlink: https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-3881
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource: N/A
Change History
0Changes found

Details not found