| Vulnerability Name: | CVE-2018-0171 (CCN-140911) | ||||||||||||
| Assigned: | 2017-11-27 | ||||||||||||
| Published: | 2018-03-28 | ||||||||||||
| Updated: | 2020-09-04 | ||||||||||||
| Summary: | A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186. | ||||||||||||
| CVSS v3 Severity: | 9.8 Critical (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) 8.8 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
8.8 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
| CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
| Vulnerability Type: | CWE-787 | ||||||||||||
| Vulnerability Consequences: | Gain Access | ||||||||||||
| References: | Source: MITRE Type: CNA CVE-2018-0171 Source: BID Type: Third Party Advisory, VDB Entry 103538 Source: CCN Type: BID-103538 Cisco IOS and IOS XE Software CVE-2018-0171 Remote Code Execution Vulnerability Source: SECTRACK Type: Third Party Advisory, VDB Entry 1040580 Source: XF Type: UNKNOWN ciscoios-cve20180171-bo(140911) Source: MISC Type: Third Party Advisory, US Government Resource https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 Source: MISC Type: Third Party Advisory, US Government Resource https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 Source: CCN Type: Cisco Security Advisory cisco-sa-20180328-smi2 Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability Source: CONFIRM Type: Vendor Advisory https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2 Source: CCN Type: CYBERSECURITY & INFRASTRUCTURE SECURITY AGENCY KNOWN EXPLOITED VULNERABILITIES CATALOG Source: MISC Type: Press/Media Coverage https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490 Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [03-29-2018] | ||||||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
| BACK | |||||||||||||