...
Cisco Virtual Security Gateway for Microsoft Hyper-V includes a version of the Network Time Protocol (NTP) that is affected by the vulnerabilities identified by the following Common Vulnerability and Exposures (CVE) IDs: CVE-2017-6463, CVE-2017-6462, CVE-2017-6458, CVE-2017-6460, CVE-2017-6464, CVE-2016-9042, CVE-2017-6451, CVE-2015-7853, CVE-2015-7704, CVE-2015-8138, CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550, CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518, CVE-2016-2519, CVE-2014-9294, CVE-2014-9293, CVE-2015-7705, CVE-2009-3563, CVE-2015-7850, CVE-2014-9295, CVE-2015-7848, CVE-2016-4957, CVE-2014-9296, CVE-2016-4953, CVE-2016-4954, CVE-2016-4955, CVE-2016-4956, CVE-2014-9298, CVE-2013-5211, CVE-2015-7855, CVE-2015-7854, CVE-2014-9297, CVE-2015-3405, CVE-2016-7434, CVE-2016-7429, CVE-2016-9312, CVE-2016-9310, CVE-2016-9311 This bug was opened to address the potential impact on this product.
Device with default configuration.
Not currently available.
Additional details about the vulnerabilities listed above can be found at http://cve.mitre.org/cve/cve.html PSIRT Evaluation: The Cisco PSIRT has assigned this bug the following CVSS version 2 score. The Base CVSS score as of the time of evaluation is 9.0: https://tools.cisco.com/security/center/cvssCalculator.x?version=2.0&vector=CVSS:2.0/AV:N/AC:L/Au:N/C:P/I:P/A:C/E:U/RL:OF/RC:C CVE ID has CVE-2017-6463, CVE-2017-6462, CVE-2017-6458, CVE-2017-6460, CVE-2017-6464, CVE-2016-9042, CVE-2017-6451, CVE-2015-7853, CVE-2015-7704, CVE-2015-8138, CVE-2016-1547, CVE-2016-1548, CVE-2016-1549, CVE-2016-1550, CVE-2016-1551, CVE-2016-2516, CVE-2016-2517, CVE-2016-2518, CVE-2016-2519, CVE-2014-9294, CVE-2014-9293, CVE-2015-7705, CVE-2009-3563, CVE-2015-7850, CVE-2014-9295, CVE-2015-7848, CVE-2016-4957, CVE-2014-9296, CVE-2016-4953, CVE-2016-4954, CVE-2016-4955, CVE-2016-4956, CVE-2014-9298, CVE-2013-5211, CVE-2015-7855, CVE-2015-7854, CVE-2014-9297, CVE-2015-3405, CVE-2016-7434, CVE-2016-7429, CVE-2016-9312, CVE-2016-9310, CVE-2016-9311 been assigned to document this issue. Additional information on Cisco's security vulnerability policy can be found at the following URL: http://www.cisco.com/en/US/products/products_security_vulnerability_policy.html
Click on a version to see all relevant bugs
Cisco Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.