INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 11m Global vulnerability Information Technology CRITICAL 44m Global malware Financial Services HIGH 54m Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Enterprise Software and Database Management CRITICAL 11m Global vulnerability Information Technology CRITICAL 44m Global malware Financial Services HIGH 54m Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Enterprise Software and Database Management CRITICAL 11m Global vulnerability Information Technology CRITICAL 44m Global malware Financial Services HIGH 54m Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h
Vulnerabilities

CVE-2017-12232

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Cisco IOS Software for Cisco Integrated Services Routers Denial-of-Service Vulnerability — A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2
Published: Mar 3, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Cisco IOS Software for Cisco Integrated Services Routers Denial-of-Service Vulnerability — A vulnerability in the implementation of a protocol in Cisco Integrated Services Routers Generation 2 (ISR G2) Routers running Cisco IOS could allow an unauthenticated, adjacent attacker to cause an affected device to reload, resulting in a denial of service.

🤖 AI Executive Summary

CVE-2017-12232 is a critical denial-of-service vulnerability in Cisco IOS Software running on Cisco Integrated Services Routers Generation 2 (ISR G2). An unauthenticated, adjacent attacker can exploit this vulnerability to cause the affected device to reload, resulting in a complete denial of service. A public exploit is available, increasing the risk of active exploitation. While this is a 2017 vulnerability, unpatched Cisco ISR G2 routers remain prevalent in many enterprise and government networks.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 7, 2026 20:33
🇸🇦 Saudi Arabia Impact Assessment
Cisco ISR G2 routers are widely deployed across Saudi Arabia in government agencies, banking institutions regulated by SAMA, telecommunications providers like STC/Mobily/Zain, energy sector organizations including ARAMCO and SEC, and healthcare facilities. This DoS vulnerability could disrupt critical network infrastructure, branch office connectivity, and WAN links. Government entities under NCA oversight and financial institutions are particularly at risk given their reliance on Cisco routing infrastructure. The adjacent attack vector limits remote exploitation but insider threats and compromised network segments remain a concern in large Saudi enterprise environments.
🏢 Affected Saudi Sectors
Government Banking Telecommunications Energy Healthcare Education Retail
⚖️ Saudi Risk Score (AI)
7.5
/ 10.0
🔧 Remediation Steps (English)
1. IMMEDIATE ACTIONS:
- Identify all Cisco ISR G2 routers in your network inventory
- Verify current IOS versions against Cisco's advisory (cisco-sa-20170927-ios-ios-xe)
- Implement network segmentation to limit adjacent network access to router management interfaces

2. PATCHING GUIDANCE:
- Apply the Cisco IOS software update as specified in Cisco Security Advisory cisco-sa-20170927-ios-ios-xe
- Schedule maintenance windows for router upgrades, prioritizing internet-facing and critical infrastructure routers
- Test patches in a lab environment before production deployment

3. COMPENSATING CONTROLS:
- Enable Control Plane Policing (CoPP) to rate-limit protocol traffic to the router
- Implement 802.1X or MAC-based port security to restrict unauthorized adjacent access
- Configure infrastructure ACLs to limit access to router interfaces
- Enable logging and SNMP traps for unexpected device reloads

4. DETECTION RULES:
- Monitor for unexpected router reloads via syslog (RELOAD messages)
- Set up SNMP monitoring for device uptime resets
- Deploy network anomaly detection for unusual Layer 2 protocol traffic patterns
- Review Cisco IOS crash dump files for exploitation indicators
🔧 خطوات المعالجة (العربية)
1. الإجراءات الفورية:
- تحديد جميع أجهزة التوجيه Cisco ISR G2 في جرد الشبكة
- التحقق من إصدارات IOS الحالية مقابل تحذير Cisco (cisco-sa-20170927-ios-ios-xe)
- تطبيق تجزئة الشبكة للحد من الوصول المجاور إلى واجهات إدارة أجهزة التوجيه

2. إرشادات التحديث:
- تطبيق تحديث برنامج Cisco IOS وفقاً لتحذير Cisco الأمني
- جدولة نوافذ صيانة لترقية أجهزة التوجيه مع إعطاء الأولوية للأجهزة الحرجة
- اختبار التحديثات في بيئة معملية قبل النشر في بيئة الإنتاج

3. الضوابط التعويضية:
- تفعيل سياسة حماية مستوى التحكم (CoPP) للحد من حركة البروتوكول
- تطبيق 802.1X أو أمان المنافذ القائم على MAC لتقييد الوصول المجاور غير المصرح به
- تكوين قوائم التحكم في الوصول للبنية التحتية
- تفعيل التسجيل وتنبيهات SNMP لإعادة التشغيل غير المتوقعة

4. قواعد الكشف:
- مراقبة إعادة التشغيل غير المتوقعة عبر سجلات النظام
- إعداد مراقبة SNMP لإعادة تعيين وقت تشغيل الجهاز
- نشر كشف الشذوذ في الشبكة لأنماط حركة البروتوكول غير العادية
- مراجعة ملفات تفريغ الأعطال للكشف عن مؤشرات الاستغلال
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC-2:3-1 (Network Security) ECC-2:5-2 (Vulnerability Management) ECC-2:3-4 (Infrastructure Protection) ECC-2:4-1 (Incident Management)
🔵 SAMA CSF
3.3.3 (Network Security Management) 3.3.4 (Patch Management) 3.3.7 (Infrastructure Security) 3.4.1 (Incident Detection and Response)
🟡 ISO 27001:2022
A.8.8 (Management of technical vulnerabilities) A.8.20 (Networks security) A.8.21 (Security of network services) A.8.9 (Configuration management)
🟣 PCI DSS v4.0
6.3.3 (Install applicable security patches) 11.3 (External and internal penetration testing) 1.2 (Network security controls)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Cisco:IOS software
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS0.99%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-03-24
Published 2022-03-03
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
7.5
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.