Vulnerability Name: | CVE-2018-15373 (CCN-150460) | ||||||||||||
Assigned: | 2018-09-26 | ||||||||||||
Published: | 2018-09-26 | ||||||||||||
Updated: | 2019-10-03 | ||||||||||||
Summary: | A vulnerability in the implementation of Cisco Discovery Protocol functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to exhaust memory on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper memory handling by the affected software when the software processes high rates of Cisco Discovery Protocol packets that are sent to a device. An attacker could exploit this vulnerability by sending a high rate of Cisco Discovery Protocol packets to an affected device. A successful exploit could allow the attacker to exhaust memory on the affected device, resulting in a DoS condition. | ||||||||||||
CVSS v3 Severity: | 7.4 High (CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H) 6.4 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
6.4 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.1 Medium (CVSS v2 Vector: AV:A/AC:L/Au:N/C:N/I:N/A:C)
| ||||||||||||
Vulnerability Type: | CWE-770 | ||||||||||||
Vulnerability Consequences: | Denial of Service | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2018-15373 Source: BID Type: Third Party Advisory, VDB Entry 105413 Source: CCN Type: BID-105413 Cisco IOS and IOS XE Software CVE-2018-15373 Denial of Service Vulnerability Source: XF Type: UNKNOWN cisco-cve201815373-dos(150460) Source: MISC Type: UNKNOWN https://ics-cert.us-cert.gov/advisories/ICSA-19-094-03 Source: CCN Type: Cisco Security Advisory cisco-sa-20180926-cdp-dos Cisco IOS and IOS XE Software Cisco Discovery Protocol Denial of Service Vulnerability Source: CISCO Type: Vendor Advisory 20180926 Cisco IOS and IOS XE Software Cisco Discovery Protocol Denial of Service Vulnerability | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |