PatchSiren cyber security CVE debrief
CVE-2017-12237 Cisco CVE debrief
CVE-2017-12237 is a Cisco IOS and IOS XE Software Internet Key Exchange (IKE) denial-of-service vulnerability. CISA lists it in the Known Exploited Vulnerabilities catalog, so defenders should treat it as actively relevant for remediation priority. The supplied corpus does not include the underlying Cisco advisory text, so this debrief stays limited to the official record titles and KEV metadata.
- Vendor
- Cisco
- Product
- IOS and IOS XE Software
- CVSS
- Unknown
- CISA KEV
- Listed
- Original CVE published
- 2022-03-03
- Original CVE updated
- 2022-03-03
- Advisory published
- 2022-03-03
- Advisory updated
- 2022-03-03
Who should care
Network and security teams responsible for Cisco IOS and IOS XE devices, especially environments that use IKE/IPsec services. Incident responders and asset owners should also care because CISA has cataloged the issue as known exploited.
Technical summary
The official record titles indicate a denial-of-service weakness in Cisco IOS and IOS XE Software affecting Internet Key Exchange (IKE). CISA’s KEV entry confirms the vulnerability is in the known-exploited set and directs defenders to apply vendor updates. No additional exploit mechanics, prerequisites, or impact details are present in the supplied corpus, so technical characterization is intentionally narrow.
Defensive priority
High. CISA placed this vulnerability in the Known Exploited Vulnerabilities catalog and assigned a remediation due date in the supplied timeline, which makes it a priority for patching and exposure review.
Recommended defensive actions
- Inventory Cisco IOS and IOS XE devices that run or expose IKE/IPsec services.
- Apply Cisco-recommended updates per vendor instructions as soon as practical.
- Prioritize remediation on systems that are externally reachable or critical to network connectivity.
- Validate that updated devices are operating normally after maintenance.
- Use compensating controls only if immediate updating is not possible, following vendor guidance.
Evidence notes
This debrief is based on the supplied CISA KEV metadata and official record links. The corpus explicitly identifies the product, vulnerability class, known-exploited status, and required action, but it does not include the Cisco advisory body or the NVD page content. CVSS values were not provided in the source data.
Official resources
-
CVE-2017-12237 CVE record
CVE.org
-
CVE-2017-12237 NVD detail
NVD
-
CISA Known Exploited Vulnerabilities catalog
CISA - Apply updates per vendor instructions.
-
Source item URL
cisa_kev
CISA KEV timeline in the supplied corpus lists this vulnerability as added on 2022-03-03 with a remediation due date of 2022-03-24. This debrief uses those supplied dates for context and does not infer the original vulnerability issue date.