{"api_version":"1","generated_at":"2026-04-24T13:35:31+00:00","cve":"CVE-2017-6627","urls":{"html":"https://cve.report/CVE-2017-6627","api":"https://cve.report/api/cve/CVE-2017-6627.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2017-6627","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2017-6627"},"summary":{"title":"CVE-2017-6627","description":"A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506.","state":"PUBLISHED","assigner":"cisco","published_at":"2017-09-07 21:29:00","updated_at":"2026-04-22 15:45:22"},"problem_types":["CWE-399","CWE-404","CWE-399 CWE-399"],"metrics":[{"version":"3.1","source":"nvd@nist.gov","type":"Primary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"3.1","source":"ADP","type":"DECLARED","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"version":"3.1","source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","score":"7.5","severity":"HIGH","vector":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"}},{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"5","severity":"","vector":"AV:N/AC:L/Au:N/C:N/I:N/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://www.securitytracker.com/id/1039289","name":"http://www.securitytracker.com/id/1039289","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry","Broken Link"],"title":"Cisco IOS/IOS XE UDP Packet Processing Flaw Lets Remote Users Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp","name":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Mitigation","Vendor Advisory"],"title":"Cisco IOS and Cisco IOS XE Software UDP Packet Processing Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-6627","name":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-6627","refsource":"134c704f-9b21-4f2e-91b3-4a467353bcc0","tags":["US Government Resource"],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"http://www.securityfocus.com/bid/100644","name":"http://www.securityfocus.com/bid/100644","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","VDB Entry","Broken Link"],"title":"Cisco IOS and Cisco IOS XE CVE-2017-6627 Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2017-6627","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2017-6627","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"Cisco IOS and Cisco IOS XE","version":"affected Cisco IOS and Cisco IOS XE","platforms":[]}],"timeline":[{"source":"ADP","time":"2022-03-03T00:00:00.000Z","lang":"en","value":"CVE-2017-6627 added to CISA KEV"}],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.1\\(2\\)gc","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.1\\(2\\)gc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.1\\(2\\)gc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.1\\(4\\)gc","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.1\\(4\\)gc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.1\\(4\\)gc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(1\\)gc","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(1\\)gc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(1\\)gc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(2\\)gc","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(3r\\)gca","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(3\\)gc","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(3\\)gc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(4\\)gc","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(4\\)gc1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(4\\)gc2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.2\\(4\\)gc3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(1\\)t","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(1\\)t1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(1\\)t2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(1\\)t3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(1\\)t4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(2\\)t","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(2\\)t1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(2\\)t2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m2.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m6a","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios","cpe6":"15.4\\(3\\)m7","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.14.0s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.14.1s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.14.2s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.14.3s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.14.4s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.15.0s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.15.1cs","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.15.1s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.15.2s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.15.3s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.15.4s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.0cs","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.0s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.1as","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.1s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.2as","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.2bs","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.2s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.3as","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.3s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.4as","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.4bs","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.4ds","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.4s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.5s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.16.6s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.17.0s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.17.1as","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.17.1s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.17.3s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.18.0as","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.18.0s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.18.1s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.18.2s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.18.3s","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2017","cve_id":"6627","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"cisco","cpe5":"ios_xe","cpe6":"3.18.3vs","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":{"cve_year":"2017","cve_id":"6627","cve":"CVE-2017-6627","vendorProject":"Cisco","product":"IOS and IOS XE Software","vulnerabilityName":"Cisco IOS Software and Cisco IOS XE Software UDP Packet Processing Denial-of-Service Vulnerability","dateAdded":"2022-03-03","shortDescription":"A vulnerability in the UDP processing code of Cisco IOS and IOS XE could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and denial of service.","requiredAction":"Apply updates per vendor instructions.","dueDate":"2022-03-24","knownRansomwareCampaignUse":"Unknown","notes":"https://nvd.nist.gov/vuln/detail/CVE-2017-6627","cwes":"CWE-399","catalogVersion":"2026.04.23","updated_at":"2026-04-23 17:27:12"},"epss":{"cve_year":"2017","cve_id":"6627","cve":"CVE-2017-6627","epss":"0.101800000","percentile":"0.931650000","score_date":"2026-04-23","updated_at":"2026-04-24 00:02:52"},"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-05T15:33:20.480Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"100644","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/100644"},{"name":"1039289","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id/1039289"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp"}],"title":"CVE Program Container"},{"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"HIGH","baseScore":7.5,"baseSeverity":"HIGH","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}},{"other":{"content":{"id":"CVE-2017-6627","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","timestamp":"2025-02-04T15:23:07.787870Z","version":"2.0.3"},"type":"ssvc"}},{"other":{"content":{"dateAdded":"2022-03-03","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-6627"},"type":"kev"}}],"providerMetadata":{"dateUpdated":"2025-10-21T23:55:34.940Z","orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP"},"references":[{"tags":["government-resource"],"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2017-6627"}],"timeline":[{"lang":"en","time":"2022-03-03T00:00:00.000Z","value":"CVE-2017-6627 added to CISA KEV"}],"title":"CISA ADP Vulnrichment"}],"cna":{"affected":[{"product":"Cisco IOS and Cisco IOS XE","vendor":"n/a","versions":[{"status":"affected","version":"Cisco IOS and Cisco IOS XE"}]}],"datePublic":"2017-09-07T00:00:00.000Z","descriptions":[{"lang":"en","value":"A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-399","description":"CWE-399","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2017-09-08T09:57:01.000Z","orgId":"d1c1063e-7a18-46af-9102-31f8928bc633","shortName":"cisco"},"references":[{"name":"100644","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/100644"},{"name":"1039289","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id/1039289"},{"tags":["x_refsource_CONFIRM"],"url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@cisco.com","ID":"CVE-2017-6627","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Cisco IOS and Cisco IOS XE","version":{"version_data":[{"version_value":"Cisco IOS and Cisco IOS XE"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-399"}]}]},"references":{"reference_data":[{"name":"100644","refsource":"BID","url":"http://www.securityfocus.com/bid/100644"},{"name":"1039289","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1039289"},{"name":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp","refsource":"CONFIRM","url":"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20170906-ios-udp"}]}}}},"cveMetadata":{"assignerOrgId":"d1c1063e-7a18-46af-9102-31f8928bc633","assignerShortName":"cisco","cveId":"CVE-2017-6627","datePublished":"2017-09-07T21:00:00.000Z","dateReserved":"2017-03-09T00:00:00.000Z","dateUpdated":"2025-10-21T23:55:34.940Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2017-09-07 21:29:00","lastModifiedDate":"2026-04-22 15:45:22","problem_types":["CWE-399","CWE-404","CWE-399 CWE-399"],"metrics":{"cvssMetricV31":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:N/I:N/A:P","baseScore":5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":10,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.1\\(2\\)gc:*:*:*:*:*:*:*","matchCriteriaId":"3CF70487-4E51-4570-927B-1B74D73E9D58"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.1\\(2\\)gc1:*:*:*:*:*:*:*","matchCriteriaId":"242A4DC2-C9C7-4ACB-99F0-317959B0CA2D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.1\\(2\\)gc2:*:*:*:*:*:*:*","matchCriteriaId":"ED4ECF5C-1B91-4B54-BAB4-2DF17A1BBF56"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.1\\(4\\)gc:*:*:*:*:*:*:*","matchCriteriaId":"1CD00484-39D2-4CD5-ABEA-3C5AD9977BB6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.1\\(4\\)gc1:*:*:*:*:*:*:*","matchCriteriaId":"5AAD9B95-0D54-49CA-824D-68175D6B4A8E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.1\\(4\\)gc2:*:*:*:*:*:*:*","matchCriteriaId":"B082C941-CE02-440F-8DD7-87873504B964"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(1\\)gc:*:*:*:*:*:*:*","matchCriteriaId":"98EB6A3F-DDAB-4FC6-A857-6E106E815505"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(1\\)gc1:*:*:*:*:*:*:*","matchCriteriaId":"7741D6E0-2507-44D9-8476-AE11DADEC611"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(1\\)gc2:*:*:*:*:*:*:*","matchCriteriaId":"0318BB57-8001-4F2A-954C-AD8DB2A94356"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(2\\)gc:*:*:*:*:*:*:*","matchCriteriaId":"C89D14BC-1718-4AE9-B107-1709C2CE965E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(3\\)gc:*:*:*:*:*:*:*","matchCriteriaId":"D80852CE-8D91-4E85-A97F-C7A9AF5278CA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(3\\)gc1:*:*:*:*:*:*:*","matchCriteriaId":"AF777880-43BF-4D4A-9BA1-B2E925B5DE11"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(3r\\)gca:*:*:*:*:*:*:*","matchCriteriaId":"CB015852-A945-4801-93AA-6C562AFAB80D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc:*:*:*:*:*:*:*","matchCriteriaId":"E3714E18-9A21-4D04-BB5E-0299AF443E2E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc1:*:*:*:*:*:*:*","matchCriteriaId":"F6FE61C7-3B61-4085-AD91-137459DA29D0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc2:*:*:*:*:*:*:*","matchCriteriaId":"71080D8B-BC81-4CDF-8626-D0F35DA40AEA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.2\\(4\\)gc3:*:*:*:*:*:*:*","matchCriteriaId":"CF10596D-457A-4DA8-8037-5E92E1D39232"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t:*:*:*:*:*:*:*","matchCriteriaId":"A0B856BB-0FFE-4A92-9CE7-D71B6C611CD3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t1:*:*:*:*:*:*:*","matchCriteriaId":"C1EE552E-226C-46DE-9861-CB148AD8FB44"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t2:*:*:*:*:*:*:*","matchCriteriaId":"CAF02C8E-9BB2-4DC2-8BF1-932835191F09"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t3:*:*:*:*:*:*:*","matchCriteriaId":"2C1B86D1-344A-470D-8A35-BD8A9ABE9D9A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(1\\)t4:*:*:*:*:*:*:*","matchCriteriaId":"C5AC88EB-7A67-4CDE-9C69-94734966E677"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(2\\)t:*:*:*:*:*:*:*","matchCriteriaId":"74E1226B-46CF-4C82-911A-86C818A75DFA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(2\\)t1:*:*:*:*:*:*:*","matchCriteriaId":"100DA24F-464E-4273-83DF-6428D0ED6641"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(2\\)t2:*:*:*:*:*:*:*","matchCriteriaId":"063C0C47-25EB-4AA4-9332-8E43CD60FF39"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m:*:*:*:*:*:*:*","matchCriteriaId":"1C85BAAF-819B-40E7-9099-04AA8D9AB114"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m1:*:*:*:*:*:*:*","matchCriteriaId":"ED684DB4-527A-4268-B197-4719B0178429"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m2:*:*:*:*:*:*:*","matchCriteriaId":"88F41406-0F55-4D74-A4F6-4ABD5A803907"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m2.2:*:*:*:*:*:*:*","matchCriteriaId":"8CF9C9AE-B5A6-4B03-9ED9-FDBB40CE5BB9"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m3:*:*:*:*:*:*:*","matchCriteriaId":"7082C083-7517-4CD4-BF95-CC7AF08D4053"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m4:*:*:*:*:*:*:*","matchCriteriaId":"370EF3DC-151F-4724-A026-3AD8ED6D801C"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m5:*:*:*:*:*:*:*","matchCriteriaId":"2B8FB86F-2A89-413B-BED7-97E3D392804E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m6:*:*:*:*:*:*:*","matchCriteriaId":"005EAD76-34BE-4E3F-8840-23F613661FE8"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m6a:*:*:*:*:*:*:*","matchCriteriaId":"2595B3E3-7FD4-4EFF-98A2-89156A657A0E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios:15.4\\(3\\)m7:*:*:*:*:*:*:*","matchCriteriaId":"FB998A1F-BAEA-4B8F-BE49-1C282ED3952E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.14.0s:*:*:*:*:*:*:*","matchCriteriaId":"FD803F59-1CD2-4CA9-9EB1-3CC4ABCD9547"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.14.1s:*:*:*:*:*:*:*","matchCriteriaId":"B9247665-BBE7-4DEF-B97B-4981A0EA5CE4"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.14.2s:*:*:*:*:*:*:*","matchCriteriaId":"E61E0102-B9B6-41F4-9041-0A5F144D849A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.14.3s:*:*:*:*:*:*:*","matchCriteriaId":"579C9E7F-6AE4-4DF5-ABCF-DB390E4669E6"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.14.4s:*:*:*:*:*:*:*","matchCriteriaId":"2A076E1F-3457-410A-8AB6-64416ECB20A7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.0s:*:*:*:*:*:*:*","matchCriteriaId":"FAD93CD1-4188-40B7-A20E-9C3FE8344A27"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.1cs:*:*:*:*:*:*:*","matchCriteriaId":"0EEAB7F8-EAB5-4E7A-8A1B-38EC16D601FB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.1s:*:*:*:*:*:*:*","matchCriteriaId":"2972E680-5A19-4858-9B35-0B959ED319A3"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.2s:*:*:*:*:*:*:*","matchCriteriaId":"F1BFE916-916F-4936-A331-21A0E8193920"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.3s:*:*:*:*:*:*:*","matchCriteriaId":"D0EC9A19-26E6-4E69-B4E7-852CB6327EAD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.15.4s:*:*:*:*:*:*:*","matchCriteriaId":"5C5484A4-D116-4B79-8369-47979E20AACA"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.0cs:*:*:*:*:*:*:*","matchCriteriaId":"5568EABF-8F43-4A87-8DE4-A03E9065BE53"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.0s:*:*:*:*:*:*:*","matchCriteriaId":"A0E5BB91-B5E7-4961-87DC-26596E5EDED7"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.1as:*:*:*:*:*:*:*","matchCriteriaId":"AC72AA6D-9E18-49F7-95CA-A4A5D7A60E4E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.1s:*:*:*:*:*:*:*","matchCriteriaId":"D3822447-EB80-4DF2-B7F2-471F55BA99C0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.2as:*:*:*:*:*:*:*","matchCriteriaId":"BA0B441A-3A09-4A58-8A40-D463003A50BC"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.2bs:*:*:*:*:*:*:*","matchCriteriaId":"51E1A64A-204D-4567-A2DC-EFEB2AE62B54"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.2s:*:*:*:*:*:*:*","matchCriteriaId":"970FD986-6D0E-441C-9BF3-C66A25763A7A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.3as:*:*:*:*:*:*:*","matchCriteriaId":"7EEFD3AD-EFA2-4808-801E-B98E4C63AA76"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.3s:*:*:*:*:*:*:*","matchCriteriaId":"1826C997-6D5D-480E-A12E-3048B6C61216"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4as:*:*:*:*:*:*:*","matchCriteriaId":"5D136C95-F837-49AD-82B3-81C25F68D0EB"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4bs:*:*:*:*:*:*:*","matchCriteriaId":"C35B3F96-B342-4AFC-A511-7A735B961ECD"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4ds:*:*:*:*:*:*:*","matchCriteriaId":"DED2D791-4142-4B9E-8401-6B63357536B0"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.4s:*:*:*:*:*:*:*","matchCriteriaId":"9FBEF4B2-EA12-445A-823E-E0E5343A405E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.5s:*:*:*:*:*:*:*","matchCriteriaId":"844E7CEC-5CB6-47AE-95F7-75693347C08E"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.16.6s:*:*:*:*:*:*:*","matchCriteriaId":"147A245E-9A5D-4178-A1AC-5B0D41C3B730"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.17.0s:*:*:*:*:*:*:*","matchCriteriaId":"12793F39-13C4-4DBC-9B78-FE361BDDF89D"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.17.1as:*:*:*:*:*:*:*","matchCriteriaId":"1AEF94C7-CEE6-4696-9F1D-549639A831C2"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.17.1s:*:*:*:*:*:*:*","matchCriteriaId":"876767C7-0196-4226-92B1-DDE851B53655"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.17.3s:*:*:*:*:*:*:*","matchCriteriaId":"141FFB5E-EA72-4FC1-B87A-B5E2D5FCFE2A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.18.0as:*:*:*:*:*:*:*","matchCriteriaId":"BE390091-D382-4436-BBB4-D4C33E4F6714"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.18.0s:*:*:*:*:*:*:*","matchCriteriaId":"EE81AA43-88D4-4EFC-B8F6-A41EFF437819"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.18.1s:*:*:*:*:*:*:*","matchCriteriaId":"6BEBCBF7-D1CF-488F-BB3E-F864F901A96A"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.18.2s:*:*:*:*:*:*:*","matchCriteriaId":"BD8CCA19-1D1C-45C0-A1A0-CED5885AD580"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.18.3s:*:*:*:*:*:*:*","matchCriteriaId":"4063CCF8-19BE-4411-B71B-147BB146700B"},{"vulnerable":true,"criteria":"cpe:2.3:o:cisco:ios_xe:3.18.3vs:*:*:*:*:*:*:*","matchCriteriaId":"FA08C168-48BE-41ED-A3BD-87BAE27A1351"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2017","CveId":"6627","Ordinal":"1","Title":"CVE-2017-6627","CVE":"CVE-2017-6627","Year":"2017"},"notes":[{"CveYear":"2017","CveId":"6627","Ordinal":"1","NoteData":"A vulnerability in the UDP processing code of Cisco IOS 15.1, 15.2, and 15.4 and IOS XE 3.14 through 3.18 could allow an unauthenticated, remote attacker to cause the input queue of an affected system to hold UDP packets, causing an interface queue wedge and a denial of service (DoS) condition. The vulnerability is due to Cisco IOS Software application changes that create UDP sockets and leave the sockets idle without closing them. An attacker could exploit this vulnerability by sending UDP packets with a destination port of 0 to an affected device. A successful exploit could allow the attacker to cause UDP packets to be held in the input interfaces queue, resulting in a DoS condition. The input interface queue will stop holding UDP packets when it receives 250 packets. Cisco Bug IDs: CSCup10024, CSCva55744, CSCva95506.","Type":"Description","Title":"CVE-2017-6627"},{"CveYear":"2017","CveId":"6627","Ordinal":"2","NoteData":"2017-09-07","Type":"Other","Title":"Published"},{"CveYear":"2017","CveId":"6627","Ordinal":"3","NoteData":"2017-09-08","Type":"Other","Title":"Modified"}]}}}