CVE-2018-0156
Severity CVSS v4.0:
Pending analysis
Type:
CWE-399
Resource Management Errors
Publication date:
28/03/2018
Last modified:
27/01/2025
Description
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
7.80
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:cisco:ios:15.2\(2\)e4:*:*:*:*:*:*:* | ||
cpe:2.3:o:cisco:ios:15.2\(2a\)ja:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_24lc-l:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_24lc-s:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_24pc-l:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_24pc-s:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_24tc-l:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_24tc-s:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_48pst-l:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_48pst-s:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_48tc-l:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960-plus_48tc-s:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960c-12pc-l:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960c-8pc-l:-:*:*:*:*:*:*:* | ||
cpe:2.3:h:cisco:catalyst_2960c-8tc-l:-:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.securityfocus.com/bid/103569
- http://www.securitytracker.com/id/1040596
- https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04
- https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi
- http://www.securityfocus.com/bid/103569
- http://www.securitytracker.com/id/1040596
- https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04
- https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05
- https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi