Cisco IOS OSPF LSA Manipulation (cisco-sa-20170727-ospf)

medium Nessus Plugin ID 131394


The remote device is missing a vendor-supplied security patch.


According to its self-reported version, Cisco IOS is affected by a vulnerability involving the Open Shortest Path First (OSPF) Routing Protocol Link State Advertisement (LSA) database. An unauthenticated, remote attacker can exploit this, by injecting crafted OSPF LSA type 1 packets, to cause the targeted router to flush its routing table and propagate the crafted OSPF LSA type 1 update through the OSPF AS domain, allowing the attacker to intercept or black-hole traffic.
Successful exploitation of this vulnerability requires that an attacker first accurately determine certain parameters within the LSA database on the target router.

Please see the included Cisco BIDs and Cisco Security Advisory for more information.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to the relevant fixed version referenced in Cisco bug ID(s) CSCva74756.

See Also

Plugin Details

Severity: Medium

ID: 131394

File Name: cisco-sa-20170727-ospf-ios.nasl

Version: 1.13

Type: combined

Family: CISCO

Published: 11/27/2019

Updated: 3/21/2023

Supported Sensors: Nessus

Risk Information


Risk Factor: Low

Score: 2.5


Risk Factor: Medium

Base Score: 4

Temporal Score: 3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:P/A:N

CVSS Score Source: CVE-2017-6770


Risk Factor: Medium

Base Score: 4.2

Temporal Score: 3.7

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/o:cisco:ios

Required KB Items: Host/Cisco/IOS/Version

Exploit Ease: No known exploits are available

Patch Publication Date: 7/27/2017

Vulnerability Publication Date: 8/7/2017

Reference Information

CVE: CVE-2017-6770

BID: 100005

CISCO-SA: cisco-sa-20170727-ospf