U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2017-12317

Change History

Initial Analysis by NIST 11/21/2017 10:53:22 AM

Action Type Old Value New Value
Added CPE Configuration

								
							
							
						
OR
     *cpe:2.3:a:cisco:advanced_malware_protection:3.1\(10\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:3.1\(15\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.0\(0\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.0\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.0\(2\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.1\(0\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.1\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.1\(4\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.2\(0\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.2\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.3\(0\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.3\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.4\(0\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.4\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.4\(2\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:4.4\(4\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.0\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.0\(3\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.0\(5\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.0\(7\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.0\(9\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.1\(1\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.1\(3\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.1\(5\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.1\(7\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.1\(9\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.1\(11\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:5.1\(13\):*:*:*:*:*:*:*
     *cpe:2.3:a:cisco:advanced_malware_protection:6.0\(1\):*:*:*:*:*:*:*
Added CVSS V2

								
							
							
						
(AV:L/AC:L/Au:N/C:P/I:P/A:P)
Added CVSS V3

								
							
							
						
AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Added CWE

								
							
							
						
CWE-798
Changed Reference Type
http://www.securityfocus.com/bid/101520 No Types Assigned
http://www.securityfocus.com/bid/101520 Third Party Advisory, VDB Entry
Changed Reference Type
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171020-ampfe No Types Assigned
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20171020-ampfe Vendor Advisory