PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-12233 Cisco CVE debrief

CVE-2017-12233 affects Cisco IOS software and is described as a Common Industrial Protocol (CIP) request denial-of-service vulnerability. Because CISA lists it in the Known Exploited Vulnerabilities catalog, defenders should treat it as a high-priority remediation item and verify whether any Cisco IOS devices in industrial or operational networks are exposed.

Vendor
Cisco
Product
IOS software
CVSS
Unknown
CISA KEV
Listed
Original CVE published
2022-03-03
Original CVE updated
2022-03-03
Advisory published
2022-03-03
Advisory updated
2022-03-03

Who should care

Cisco IOS administrators, network and security teams, and OT/industrial control operators who manage Cisco IOS devices that process Common Industrial Protocol traffic.

Technical summary

Based on the supplied title and CISA KEV metadata, this issue is a denial-of-service vulnerability in Cisco IOS software associated with handling Common Industrial Protocol requests. The provided source corpus does not include exploit mechanics, affected version ranges, or fixed-release details; use the official CVE and NVD records, plus vendor guidance, to determine exact exposure and remediation steps.

Defensive priority

High. CISA added this CVE to the KEV catalog on 2022-03-03 and set a remediation due date of 2022-03-24, which indicates defenders should prioritize identification and patching promptly.

Recommended defensive actions

  • Inventory Cisco IOS devices and determine whether any are in scope for this CVE.
  • Check whether exposed systems handle Common Industrial Protocol traffic or sit in industrial/OT environments.
  • Apply updates per vendor instructions as directed by CISA KEV guidance.
  • Consult the official CVE and NVD records to confirm affected and fixed versions before scheduling maintenance.
  • Verify service stability after remediation and monitor for denial-of-service symptoms during and after change windows.

Evidence notes

This debrief is based only on the supplied CISA KEV metadata and the official CVE/NVD/CISA links. The KEV entry identifies Cisco IOS software as the affected product, names the issue as a Common Industrial Protocol request denial-of-service vulnerability, and states the required action is to apply updates per vendor instructions. The dates used here are the supplied 2022-03-03 CVE/KEV timestamps; no additional vendor advisory details were provided in the source corpus.

Official resources

Known exploited vulnerability listing from CISA KEV. This summary is intentionally limited to the supplied metadata and official record links; it does not include exploit details or unsupported claims.