Vulnerability Details : CVE-2018-0171
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.
Vulnerability category: OverflowMemory CorruptionInput validationExecute codeDenial of service
Products affected by CVE-2018-0171
- cpe:2.3:o:cisco:ios:15.2\(5\)e:*:*:*:*:*:*:*
CVE-2018-0171 is in the CISA Known Exploited Vulnerabilities Catalog
CISA vulnerability name:
Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
Cisco IOS and IOS XE Software improperly validates packet data, allowing an unauthenticated, remote attacker to trigger a reload of an affected device, cause a denial-of-service (DoS) condition, or perform code execution on the affected device.
Notes:
https://nvd.nist.gov/vuln/detail/CVE-2018-0171
Added on
2021-11-03
Action due date
2022-05-03
Exploit prediction scoring system (EPSS) score for CVE-2018-0171
74.49%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 98 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-0171
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST | |
9.8
|
CRITICAL | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
3.9
|
5.9
|
NIST |
CWE ids for CVE-2018-0171
-
The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.Assigned by: ykramarz@cisco.com (Secondary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-0171
-
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490
Attackers Exploit Cisco Switch Issue as Vendor ...Press/Media Coverage
-
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04
Rockwell Automation Stratix and ArmorStratix Switches | CISAThird Party Advisory;US Government Resource
-
http://www.securityfocus.com/bid/103538
Cisco IOS and IOS XE Software CVE-2018-0171 Remote Code Execution VulnerabilityThird Party Advisory;VDB Entry
-
http://www.securitytracker.com/id/1040580
Cisco IOS/IOS XE Buffer Overflow in Processing Smart Install Packets Lets Remote Users Execute Arbitrary Code - SecurityTrackerThird Party Advisory;VDB Entry
-
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2
Cisco IOS and IOS XE Software Smart Install Remote Code Execution VulnerabilityVendor Advisory
-
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05
Rockwell Automation Stratix Industrial Managed Ethernet Switch | CISAThird Party Advisory;US Government Resource
Jump to