INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 11m Global vulnerability Information Technology CRITICAL 44m Global malware Financial Services HIGH 54m Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Enterprise Software and Database Management CRITICAL 11m Global vulnerability Information Technology CRITICAL 44m Global malware Financial Services HIGH 54m Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Enterprise Software and Database Management CRITICAL 11m Global vulnerability Information Technology CRITICAL 44m Global malware Financial Services HIGH 54m Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h
Vulnerabilities

CVE-2017-12231

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Cisco IOS Software Network Address Translation Denial-of-Service Vulnerability — A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS could allow an un
Published: Mar 3, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Cisco IOS Software Network Address Translation Denial-of-Service Vulnerability — A vulnerability in the implementation of Network Address Translation (NAT) functionality in Cisco IOS could allow an unauthenticated, remote attacker to cause a denial of service.

🤖 AI Executive Summary

CVE-2017-12231 is a critical vulnerability in Cisco IOS Software's Network Address Translation (NAT) implementation that allows an unauthenticated, remote attacker to cause a denial of service (DoS) condition. With a CVSS score of 9.0 and publicly available exploits, this vulnerability poses a severe risk to network infrastructure relying on Cisco IOS devices with NAT enabled. Successful exploitation could crash affected devices or cause them to reload, disrupting network connectivity. Organizations using Cisco IOS routers and switches with NAT functionality should prioritize immediate patching.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 7, 2026 20:32
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability has significant impact across Saudi Arabian infrastructure given the widespread deployment of Cisco IOS devices. The telecom sector (STC, Mobily, Zain) is at highest risk as NAT is fundamental to their network operations. Government entities regulated by NCA, banking institutions under SAMA oversight, and energy sector organizations including Saudi Aramco heavily rely on Cisco networking equipment with NAT functionality. A successful DoS attack could disrupt critical services including online banking, government e-services (Absher, Tawakkalna), and industrial control network communications in the energy sector. Saudi healthcare networks and educational institutions using Cisco infrastructure are also vulnerable.
🏢 Affected Saudi Sectors
Telecommunications Government Banking Energy Healthcare Education Retail
⚖️ Saudi Risk Score (AI)
8.5
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all Cisco IOS devices with NAT enabled using 'show ip nat translations' and 'show ip nat statistics' commands
2. Apply Cisco's official security patch immediately — refer to Cisco Security Advisory cisco-sa-20170927-nat
3. If immediate patching is not possible, implement the following compensating controls:
- Deploy ACLs to restrict traffic to NAT-enabled interfaces from untrusted sources
- Enable Control Plane Policing (CoPP) to rate-limit traffic to the device
- Monitor device CPU and memory utilization for anomalies
4. Implement IPS/IDS signatures to detect exploitation attempts
5. Ensure device redundancy (HSRP/VRRP) is configured to minimize service disruption
6. Schedule maintenance windows for patching production devices
7. Verify patch application with 'show version' command post-update

Detection Rules:
- Monitor for unexpected device reloads via syslog
- Alert on high NAT translation table utilization
- Monitor for crafted packets targeting NAT-enabled interfaces
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع أجهزة Cisco IOS التي تم تفعيل NAT عليها باستخدام أوامر 'show ip nat translations' و 'show ip nat statistics'
2. تطبيق التصحيح الأمني الرسمي من Cisco فوراً — الرجوع إلى نشرة Cisco الأمنية cisco-sa-20170927-nat
3. في حالة عدم إمكانية التصحيح الفوري، تنفيذ الضوابط التعويضية التالية:
- نشر قوائم التحكم في الوصول (ACL) لتقييد حركة المرور إلى واجهات NAT من المصادر غير الموثوقة
- تفعيل سياسة مستوى التحكم (CoPP) للحد من معدل حركة المرور إلى الجهاز
- مراقبة استخدام المعالج والذاكرة للأجهزة للكشف عن أي شذوذ
4. تنفيذ توقيعات IPS/IDS للكشف عن محاولات الاستغلال
5. التأكد من تكوين تكرار الأجهزة (HSRP/VRRP) لتقليل انقطاع الخدمة
6. جدولة نوافذ الصيانة لتصحيح أجهزة الإنتاج
7. التحقق من تطبيق التصحيح باستخدام أمر 'show version' بعد التحديث

قواعد الكشف:
- مراقبة إعادة تشغيل الأجهزة غير المتوقعة عبر سجلات النظام
- التنبيه عند ارتفاع استخدام جدول ترجمة NAT
- مراقبة الحزم المصممة التي تستهدف واجهات NAT
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2:3-1 (Network Security) ECC-2:3-3 (Infrastructure Security) ECC-2:4-1 (Vulnerability Management) ECC-2:5-2 (Incident Management)
🔵 SAMA CSF
3.3.3 (Network Security Management) 3.3.4 (System Security) 3.3.7 (Vulnerability Management) 3.4.1 (Incident and Threat Management)
🟡 ISO 27001:2022
A.8.9 (Configuration Management) A.8.8 (Management of Technical Vulnerabilities) A.8.20 (Networks Security) A.8.21 (Security of Network Services)
🟣 PCI DSS v4.0
PCI DSS 6.3.3 (Patching Security Vulnerabilities) PCI DSS 1.2.1 (Network Security Controls) PCI DSS 11.3 (Vulnerability Scanning)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Cisco:IOS software
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS6.80%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-03-24
Published 2022-03-03
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
8.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.