A vulnerability in the TCP throttling process of Cisco UCS C-Series Rack Servers 3.0(0.234) could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to insufficient rate-limiting protection. An attacker could exploit this vulnerability by sending a high rate of TCP SYN packets to a specific TCP listening port on an affected device. An exploit could allow the attacker to cause a specific TCP listening port to stop accepting new connections, resulting in a DoS condition. Cisco Bug IDs: CSCva65544.
2017-05-22T01:29:00.273
2025-04-20T01:37:25.860
Deferred
CVSSv3.0: 7.5 (HIGH)
AV:N/AC:L/Au:N/C:N/I:N/A:P
10.0
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | cisco | unified_computing_system | 3.0\(0.234\) | Yes |
Hardware | cisco | ucs_c220_m4_rack_server | - | No |
Hardware | cisco | ucs_c240_m4_rack_server | - | No |
Hardware | cisco | ucs_c3160_rack_server | - | No |
Hardware | cisco | ucs_c460_m4_rack_server | - | No |