INITIALIZING
📧 info@ciso.sa | 📱 +966550939344 | Riyadh, Kingdom of Saudi Arabia
🔧 Scheduled Maintenance — Saturday 2:00-4:00 AM AST. Some features may be temporarily unavailable.    ●   
💎
Pro Plan 50% Off Unlock all AI features, unlimited reports, and priority support. Upgrade
Search Center
ESC to close
Global vulnerability Enterprise Software and Database Management CRITICAL 11m Global vulnerability Information Technology CRITICAL 44m Global malware Financial Services HIGH 54m Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Enterprise Software and Database Management CRITICAL 11m Global vulnerability Information Technology CRITICAL 44m Global malware Financial Services HIGH 54m Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h Global vulnerability Enterprise Software and Database Management CRITICAL 11m Global vulnerability Information Technology CRITICAL 44m Global malware Financial Services HIGH 54m Global vulnerability Technology/Software CRITICAL 1h Global vulnerability Information Technology HIGH 1h Global data_breach Government CRITICAL 11h Global ransomware Financial Services / Cybersecurity CRITICAL 11h Global vulnerability Information Technology / Cybersecurity CRITICAL 13h Global malware Energy and Utilities CRITICAL 14h Global ransomware Multiple sectors CRITICAL 14h
Vulnerabilities

CVE-2017-12238

Critical 🇺🇸 CISA KEV ⚡ Exploit Available
Cisco Catalyst 6800 Series Switches VPLS Denial-of-Service Vulnerability — A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS for Cisco Catalyst 6800 Series Switches could all
Published: Mar 3, 2022  ·  Source: CISA_KEV
CVSS v3
9.0
🔗 NVD Official
📄 Description (English)

Cisco Catalyst 6800 Series Switches VPLS Denial-of-Service Vulnerability — A vulnerability in the Virtual Private LAN Service (VPLS) code of Cisco IOS for Cisco Catalyst 6800 Series Switches could allow an unauthenticated, adjacent attacker to cause a denial of service.

🤖 AI Executive Summary

CVE-2017-12238 is a critical denial-of-service vulnerability in the Virtual Private LAN Service (VPLS) implementation of Cisco IOS on Catalyst 6800 Series Switches. An unauthenticated, adjacent attacker can exploit this vulnerability to cause a device reload, resulting in a denial of service. With a CVSS score of 9.0 and known exploits available, this poses a significant risk to organizations relying on Cisco Catalyst 6800 switches for their network infrastructure. Immediate patching is strongly recommended as the vulnerability can disrupt critical network services.

📄 Description (Arabic)

🤖 AI Intelligence Analysis Analyzed: Apr 8, 2026 00:36
🇸🇦 Saudi Arabia Impact Assessment
This vulnerability poses significant risk to Saudi organizations that deploy Cisco Catalyst 6800 Series Switches in their core or distribution network layers. The telecommunications sector (STC, Mobily, Zain) and large enterprises are most at risk as these switches are commonly used in carrier-grade and large campus networks. Government entities regulated by NCA, banking institutions under SAMA oversight, and energy sector organizations including ARAMCO and SEC that rely on VPLS for multi-site connectivity could experience critical network outages. Data centers and managed service providers in Saudi Arabia using these switches for VPLS-based services face direct exposure to adjacent-network attacks.
🏢 Affected Saudi Sectors
Telecommunications Government Banking Energy Healthcare Data Centers
⚖️ Saudi Risk Score (AI)
7.8
/ 10.0
🔧 Remediation Steps (English)
Immediate Actions:
1. Identify all Cisco Catalyst 6800 Series Switches running affected IOS versions in your environment
2. Apply the Cisco security patch immediately — refer to Cisco Security Advisory cisco-sa-20170927-vpls
3. If VPLS is not required, disable the VPLS feature as a compensating control

Patching Guidance:
- Upgrade Cisco IOS to the fixed software version as specified in the Cisco advisory
- Schedule emergency maintenance windows for critical infrastructure switches
- Test patches in a staging environment before production deployment

Compensating Controls:
- Implement strict Layer 2 access controls to limit adjacent network access
- Enable port security and 802.1X authentication on access ports
- Segment VPLS domains to minimize blast radius
- Monitor for unusual traffic patterns on VPLS-enabled interfaces

Detection Rules:
- Monitor for unexpected switch reloads or crashinfo files
- Configure SNMP traps for device reload events
- Implement syslog monitoring for VPLS-related error messages
- Deploy network monitoring to detect adjacency-based attack patterns
🔧 خطوات المعالجة (العربية)
الإجراءات الفورية:
1. تحديد جميع محولات Cisco Catalyst 6800 Series التي تعمل بإصدارات IOS المتأثرة في بيئتكم
2. تطبيق تصحيح Cisco الأمني فوراً — الرجوع إلى نشرة Cisco الأمنية cisco-sa-20170927-vpls
3. في حال عدم الحاجة لخدمة VPLS، قم بتعطيل الميزة كإجراء تعويضي

إرشادات التحديث:
- ترقية نظام Cisco IOS إلى الإصدار المصحح وفقاً لنشرة Cisco
- جدولة نوافذ صيانة طارئة للمحولات الحيوية
- اختبار التحديثات في بيئة اختبارية قبل النشر في بيئة الإنتاج

الضوابط التعويضية:
- تطبيق ضوابط وصول صارمة على الطبقة الثانية للحد من الوصول للشبكة المجاورة
- تفعيل أمان المنافذ ومصادقة 802.1X على منافذ الوصول
- تقسيم نطاقات VPLS لتقليل نطاق التأثير
- مراقبة أنماط حركة المرور غير العادية على واجهات VPLS

قواعد الكشف:
- مراقبة إعادة التشغيل غير المتوقعة للمحولات أو ملفات معلومات الأعطال
- تكوين تنبيهات SNMP لأحداث إعادة تشغيل الأجهزة
- تنفيذ مراقبة سجلات النظام لرسائل أخطاء VPLS
- نشر مراقبة الشبكة للكشف عن أنماط الهجوم القائمة على الشبكة المجاورة
📋 Regulatory Compliance Mapping
🟢 NCA ECC 2024
ECC 2-3-1 (Network Security) ECC 2-5-1 (Vulnerability Management) ECC 2-3-4 (Network Monitoring) ECC 2-2-1 (Asset Management)
🔵 SAMA CSF
3.3.3 (Network Security Management) 3.3.4 (Vulnerability Management) 3.3.7 (Infrastructure Security) 3.4.1 (Incident Management)
🟡 ISO 27001:2022
A.8.9 (Configuration Management) A.8.8 (Management of Technical Vulnerabilities) A.8.20 (Network Security) A.8.16 (Monitoring Activities)
🟣 PCI DSS v4.0
6.3.3 (Patching Security Vulnerabilities) 11.3 (Vulnerability Scanning) 1.2 (Network Security Controls)
🔗 References & Sources 0
No references.
📦 Affected Products / CPE 1 entries
Cisco:Catalyst 6800 Series Switches
📊 CVSS Score
9.0
/ 10.0 — Critical
📋 Quick Facts
Severity Critical
CVSS Score9.0
EPSS1.15%
Exploit ✓ Yes
Patch ✓ Yes
CISA KEV🇺🇸 Yes
KEV Due Date2022-03-24
Published 2022-03-03
Source Feed cisa_kev
Views 2
🇸🇦 Saudi Risk Score
7.8
/ 10.0 — Saudi Risk
🏷️ Tags
kev actively-exploited
Share this CVE
📣 Found this valuable?
Share it with your cybersecurity network
in LinkedIn 𝕏 X / Twitter 💬 WhatsApp ✈ Telegram
🍪 Privacy Preferences
CISO Consulting — Compliant with Saudi Personal Data Protection Law (PDPL)
We use cookies and similar technologies to provide the best experience on our platform. You can choose which types you accept.
🔒
Essential Always On
Required for the website to function properly. Cannot be disabled.
📋 Sessions, CSRF tokens, authentication, language preferences
📊
Analytics
Help us understand how visitors use the site and improve performance.
📋 Page views, session duration, traffic sources, performance metrics
⚙️
Functional
Enable enhanced features like content personalization and preferences.
📋 Dark/light theme, font size, custom dashboards, saved filters
📣
Marketing
Used to deliver content and ads relevant to your interests.
📋 Campaign tracking, retargeting, social media analytics
Privacy Policy →
CISO AI Assistant
Ask anything · Documents · Support
🔐

Introduce Yourself

Enter your details to access the full assistant

Your info is private and never shared
💬
CyberAssist
Online · responds in seconds
5 / 5
🔐 Verify Your Identity

Enter your email to receive a verification code before submitting a support request.

Enter to send · / for commands 0 / 2000
CISO AI · Powered by Anthropic Claude
✦ Quick Survey Help Us Improve CISO Consulting Your feedback shapes the future of our platform — takes less than 2 minutes.
⚠ Please answer this question to continue

How would you rate your overall experience with our platform?

Rate from 1 (poor) to 5 (excellent)

🎉
Thank you!
Your response has been recorded.