CVE-2017-6627
Summary
| CVE | CVE-2017-6627 |
|---|---|
| State | PUBLISHED |
| Assigner | cisco |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2017-09-07 21:29:00 UTC |
| Updated | 2026-04-22 15:45:22 UTC |
| Description | A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506. |
Risk And Classification
Primary CVSS: v3.1 7.5 HIGH from [email protected]
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS: 0.101800000 probability, percentile 0.931650000 (date 2026-04-23)
CISA KEV: Listed on 2022-03-03; due 2022-03-24; ransomware use Unknown
Problem Types: CWE-399 | CWE-404 | CWE-399 CWE-399
| Version | Source | Type | Score | Severity | Vector |
|---|---|---|---|---|---|
| 3.1 | [email protected] | Primary | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 3.1 | ADP | DECLARED | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 3.1 | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | Secondary | 7.5 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
| 2.0 | [email protected] | Primary | 5 | AV:N/AC:L/Au:N/C:N/I:N/A:P |
CVSS v3.1 Breakdown
Attack Vector
NetworkAttack Complexity
LowPrivileges Required
NoneUser Interaction
NoneScope
UnchangedConfidentiality
NoneIntegrity
NoneAvailability
HighCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CVSS v2.0 Breakdown
Access Vector
NetworkAccess Complexity
LowAuthentication
NoneConfidentiality
NoneIntegrity
NoneAvailability
PartialAV:N/AC:L/Au:N/C:N/I:N/A:P
CISA Known Exploited Vulnerability
| Vendor | Cisco |
|---|---|
| Product | IOS and IOS XE Software |
| Name | Cisco IOS Software and Cisco IOS XE Software UDP Packet Processing Denial-of-Service Vulnerability |
| Required Action | Apply updates per vendor instructions. |
| Notes | https://nvd.nist.gov/vuln/detail/CVE-2017-6627 |
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Cisco | Ios | 15.1\(2\)gc | All | All | All |
| Operating System | Cisco | Ios | 15.1\(2\)gc1 | All | All | All |
| Operating System | Cisco | Ios | 15.1\(2\)gc2 | All | All | All |
| Operating System | Cisco | Ios | 15.1\(4\)gc | All | All | All |
| Operating System | Cisco | Ios | 15.1\(4\)gc1 | All | All | All |
| Operating System | Cisco | Ios | 15.1\(4\)gc2 | All | All | All |
| Operating System | Cisco | Ios | 15.2\(1\)gc | All | All | All |
| Operating System | Cisco | Ios | 15.2\(1\)gc1 | All | All | All |
| Operating System | Cisco | Ios | 15.2\(1\)gc2 | All | All | All |
| Operating System | Cisco | Ios | 15.2\(2\)gc | All | All | All |
| Operating System | Cisco | Ios | 15.2\(3r\)gca | All | All | All |
| Operating System | Cisco | Ios | 15.2\(3\)gc | All | All | All |
| Operating System | Cisco | Ios | 15.2\(3\)gc1 | All | All | All |
| Operating System | Cisco | Ios | 15.2\(4\)gc | All | All | All |
| Operating System | Cisco | Ios | 15.2\(4\)gc1 | All | All | All |
| Operating System | Cisco | Ios | 15.2\(4\)gc2 | All | All | All |
| Operating System | Cisco | Ios | 15.2\(4\)gc3 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(1\)t | All | All | All |
| Operating System | Cisco | Ios | 15.4\(1\)t1 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(1\)t2 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(1\)t3 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(1\)t4 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(2\)t | All | All | All |
| Operating System | Cisco | Ios | 15.4\(2\)t1 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(2\)t2 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m1 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m2 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m2.2 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m3 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m4 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m5 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m6 | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m6a | All | All | All |
| Operating System | Cisco | Ios | 15.4\(3\)m7 | All | All | All |
| Operating System | Cisco | Ios Xe | 3.14.0s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.14.1s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.14.2s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.14.3s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.14.4s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.15.0s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.15.1cs | All | All | All |
| Operating System | Cisco | Ios Xe | 3.15.1s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.15.2s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.15.3s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.15.4s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.0cs | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.0s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.1as | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.1s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.2as | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.2bs | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.2s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.3as | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.3s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.4as | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.4bs | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.4ds | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.4s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.5s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.16.6s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.17.0s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.17.1as | All | All | All |
| Operating System | Cisco | Ios Xe | 3.17.1s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.17.3s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.18.0as | All | All | All |
| Operating System | Cisco | Ios Xe | 3.18.0s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.18.1s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.18.2s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.18.3s | All | All | All |
| Operating System | Cisco | Ios Xe | 3.18.3vs | All | All | All |
Vendor Declared Affected Products
| Source | Vendor | Product | Version | Platforms |
|---|---|---|---|---|
| CNA | Na | Cisco IOS And Cisco IOS XE | affected Cisco IOS and Cisco IOS XE | Not specified |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Cisco IOS/IOS XE UDP Packet Processing Flaw Lets Remote Users Deny Service - SecurityTracker | af854a3a-2127-422b-91ae-364da2661108 | www.securitytracker.com | Third Party Advisory, VDB Entry, Broken Link |
| Cisco IOS and Cisco IOS XE Software UDP Packet Processing Denial of Service Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | tools.cisco.com | Mitigation, Vendor Advisory |
| www.cisa.gov/known-exploited-vulnerabilities-catalog | 134c704f-9b21-4f2e-91b3-4a467353bcc0 | www.cisa.gov | US Government Resource |
| Cisco IOS and Cisco IOS XE CVE-2017-6627 Denial of Service Vulnerability | af854a3a-2127-422b-91ae-364da2661108 | www.securityfocus.com | Third Party Advisory, VDB Entry, Broken Link |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
| CISA Known Exploited Vulnerabilities catalog | CISA | www.cisa.gov | kev |
No vendor comments have been submitted for this CVE.
Additional Advisory Data
| Source | Time | Event |
|---|---|---|
| ADP | 2022-03-03T00:00:00.000Z | CVE-2017-6627 added to CISA KEV |
There are currently no legacy QID mappings associated with this CVE.