Vulnerabilities
Vulnerable Software

Vulnerability Details CVE-2017-6664

A vulnerability in the Autonomic Networking feature of Cisco IOS XE Software could allow an unauthenticated, remote, autonomic node to access the Autonomic Networking infrastructure of an affected system, after the certificate for the autonomic node has been revoked. This vulnerability affected devices that are running Release 16.x of Cisco IOS XE Software and are configured to use Autonomic Networking. This vulnerability does not affect devices that are running an earlier release of Cisco IOS XE Software or devices that are not configured to use Autonomic Networking. More Information: CSCvd22328. Known Affected Releases: 15.5(1)S3.1 Denali-16.2.1.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 50.3%
CVSS Severity
CVSS v3 Score 7.5
CVSS v2 Score 5.0
Products affected by CVE-2017-6664
  • Cisco » Ios Xe » Version: 16.5.1c
    cpe:2.3:o:cisco:ios_xe:16.5.1c
  • Cisco » Ios Xe » Version: 16.6.1
    cpe:2.3:o:cisco:ios_xe:16.6.1
  • Cisco » Ios Xe » Version: 3.10.8as
    cpe:2.3:o:cisco:ios_xe:3.10.8as
  • Cisco » Ios Xe » Version: 3.10.8s
    cpe:2.3:o:cisco:ios_xe:3.10.8s
  • Cisco » Ios Xe » Version: 3.12.0s
    cpe:2.3:o:cisco:ios_xe:3.12.0s
  • Cisco » Ios Xe » Version: 3.12.1s
    cpe:2.3:o:cisco:ios_xe:3.12.1s
  • Cisco » Ios Xe » Version: 3.12.2s
    cpe:2.3:o:cisco:ios_xe:3.12.2s
  • Cisco » Ios Xe » Version: 3.12.3s
    cpe:2.3:o:cisco:ios_xe:3.12.3s
  • Cisco » Ios Xe » Version: 3.12.4s
    cpe:2.3:o:cisco:ios_xe:3.12.4s
  • Cisco » Ios Xe » Version: 3.13.1s
    cpe:2.3:o:cisco:ios_xe:3.13.1s
  • Cisco » Ios Xe » Version: 3.13.2s
    cpe:2.3:o:cisco:ios_xe:3.13.2s
  • Cisco » Ios Xe » Version: 3.13.4s
    cpe:2.3:o:cisco:ios_xe:3.13.4s
  • Cisco » Ios Xe » Version: 3.13.5s
    cpe:2.3:o:cisco:ios_xe:3.13.5s
  • Cisco » Ios Xe » Version: 3.14.0s
    cpe:2.3:o:cisco:ios_xe:3.14.0s
  • Cisco » Ios Xe » Version: 3.14.1s
    cpe:2.3:o:cisco:ios_xe:3.14.1s
  • Cisco » Ios Xe » Version: 3.14.2s
    cpe:2.3:o:cisco:ios_xe:3.14.2s
  • Cisco » Ios Xe » Version: 3.14.3s
    cpe:2.3:o:cisco:ios_xe:3.14.3s
  • Cisco » Ios Xe » Version: 3.14.4s
    cpe:2.3:o:cisco:ios_xe:3.14.4s
  • Cisco » Ios Xe » Version: 3.15.0s
    cpe:2.3:o:cisco:ios_xe:3.15.0s
  • Cisco » Ios Xe » Version: 3.15.1s
    cpe:2.3:o:cisco:ios_xe:3.15.1s
  • Cisco » Ios Xe » Version: 3.15.2s
    cpe:2.3:o:cisco:ios_xe:3.15.2s
  • Cisco » Ios Xe » Version: 3.15.3s
    cpe:2.3:o:cisco:ios_xe:3.15.3s
  • Cisco » Ios Xe » Version: 3.16.0s
    cpe:2.3:o:cisco:ios_xe:3.16.0s
  • Cisco » Ios Xe » Version: 3.16.1as
    cpe:2.3:o:cisco:ios_xe:3.16.1as
  • Cisco » Ios Xe » Version: 3.16.2as
    cpe:2.3:o:cisco:ios_xe:3.16.2as
  • Cisco » Ios Xe » Version: 3.16.2s
    cpe:2.3:o:cisco:ios_xe:3.16.2s
  • Cisco » Ios Xe » Version: 3.17.0s
    cpe:2.3:o:cisco:ios_xe:3.17.0s
  • Cisco » Ios Xe » Version: 3.17.1s
    cpe:2.3:o:cisco:ios_xe:3.17.1s
  • Cisco » Ios Xe » Version: 3.18.0s
    cpe:2.3:o:cisco:ios_xe:3.18.0s


Contact Us

Shodan ® - All rights reserved