Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2017-5872 : Vulnerability Insights and Analysis

Learn about CVE-2017-5872 affecting Unisys ClearPath MCP systems with TCP-IP-SW versions 57.1 to 59.172. Find out how to prevent network disruption and denial of service attacks.

Unisys ClearPath MCP systems with TCP-IP-SW versions 57.1 prior to 57.152, 58.1 prior to 58.142, or 59.1 prior to 59.172 may experience a network connectivity disruption due to a vulnerability in the TCP/IP networking module.

Understanding CVE-2017-5872

This CVE involves a denial of service vulnerability that can be exploited by remote attackers.

What is CVE-2017-5872?

The vulnerability in Unisys ClearPath MCP systems allows attackers to trigger a denial of service by sending a client hello with a signature_algorithms extension that exceeds defined limits.

The Impact of CVE-2017-5872

Exploiting this vulnerability can lead to a network connectivity disruption on affected systems, potentially causing a denial of service.

Technical Details of CVE-2017-5872

Unpacking the technical aspects of this CVE.

Vulnerability Description

        Attackers exploit a vulnerability in the TCP/IP networking module of Unisys ClearPath MCP systems with specific versions to trigger a denial of service by causing a full memory dump.

Affected Systems and Versions

        Unisys ClearPath MCP systems with TCP-IP-SW versions 57.1 to 57.152, 58.1 to 58.142, or 59.1 to 59.172 are vulnerable.

Exploitation Mechanism

        Attackers send a client hello with a signature_algorithms extension that surpasses defined limits in RFC 5246, leading to a full memory dump and denial of service.

Mitigation and Prevention

Exploring steps to mitigate and prevent the CVE-2017-5872 vulnerability.

Immediate Steps to Take

        Disable TLS 1.2 services on affected Unisys ClearPath MCP systems to prevent exploitation.
        Monitor network traffic for any suspicious activity that could indicate an attack.

Long-Term Security Practices

        Regularly update and patch Unisys ClearPath MCP systems to address known vulnerabilities.
        Implement network segmentation and access controls to limit the impact of potential attacks.

Patching and Updates

        Apply patches provided by Unisys for TCP-IP-SW versions 57.152, 58.142, and 59.172 to mitigate the vulnerability.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now