Vulnerability Name:

CVE-2018-0161 (CCN-140957)

Assigned:2017-11-27
Published:2018-03-28
Updated:2019-10-03
Summary:A vulnerability in the Simple Network Management Protocol (SNMP) subsystem of Cisco IOS Software running on certain models of Cisco Catalyst Switches could allow an authenticated, remote attacker to cause a denial of service (DoS) condition, aka a GET MIB Object ID Denial of Service Vulnerability. The vulnerability is due to a condition that could occur when the affected software processes an SNMP read request that contains a request for the ciscoFlashMIB object ID (OID). An attacker could trigger this vulnerability by issuing an SNMP GET request for the ciscoFlashMIB OID on an affected device. A successful exploit could cause the affected device to restart due to a SYS-3-CPUHOG. This vulnerability affects the following Cisco devices if they are running a vulnerable release of Cisco IOS Software and are configured to use SNMP Version 2 (SNMPv2) or SNMP Version 3 (SNMPv3): Cisco Catalyst 2960-L Series Switches, Cisco Catalyst Digital Building Series Switches 8P, Cisco Catalyst Digital Building Series Switches 8U. Cisco Bug IDs: CSCvd89541.
CVSS v3 Severity:6.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H)
5.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
7.7 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H)
6.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): Low
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): High
CVSS v2 Severity:6.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
6.8 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:N/I:N/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): Single_Instance
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Complete
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Denial of Service
References:Source: MITRE
Type: CNA
CVE-2018-0161

Source: CCN
Type: Oracle CPUApr2019
Oracle Critical Patch Update Advisory - April 2019

Source: BID
Type: Third Party Advisory, VDB Entry
103573

Source: CCN
Type: BID-103573
Cisco IOS Software CVE-2018-0161 Denial of Service Vulnerability

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1040589

Source: XF
Type: UNKNOWN
cisco-cve20180161-dos(140957)

Source: CCN
Type: Cisco Security Advisory cisco-sa-20180328-snmp
Cisco IOS Software Simple Network Management Protocol GET MIB Object ID Denial of Service Vulnerability

Source: CONFIRM
Type: Mitigation, Vendor Advisory
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp

Source: CCN
Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY
KNOWN EXPLOITED VULNERABILITIES CATALOG

Vulnerable Configuration:Configuration 1:
  • cpe:/o:cisco:ios:15.2(5)e:*:*:*:*:*:*:*
  • AND
  • cpe:/h:cisco:catalyst_2960l-16ps-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-16ts-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-24pq-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-24ps-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-24tq-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-24ts-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-48pq-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-48ps-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-48tq-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-48ts-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-8ps-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_2960l-8ts-ll:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_digital_building_series_switches-8p:-:*:*:*:*:*:*:*
  • OR cpe:/h:cisco:catalyst_digital_building_series_switches-8u:-:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:cisco:ios_software:*:*:*:*:*:*:*:*
  • AND
  • cpe:/a:oracle:enterprise_manager_ops_center:12.3.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    cisco ios 15.2(5)e
    cisco catalyst 2960l-16ps-ll -
    cisco catalyst 2960l-16ts-ll -
    cisco catalyst 2960l-24pq-ll -
    cisco catalyst 2960l-24ps-ll -
    cisco catalyst 2960l-24tq-ll -
    cisco catalyst 2960l-24ts-ll -
    cisco catalyst 2960l-48pq-ll -
    cisco catalyst 2960l-48ps-ll -
    cisco catalyst 2960l-48tq-ll -
    cisco catalyst 2960l-48ts-ll -
    cisco catalyst 2960l-8ps-ll -
    cisco catalyst 2960l-8ts-ll -
    cisco catalyst digital building series switches-8p -
    cisco catalyst digital building series switches-8u -
    cisco ios software *
    oracle enterprise manager ops center 12.3.3