Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2018-0177 (GCVE-0-2018-0177)
Vulnerability from cvelistv5 – Published: 2018-03-28 22:00 – Updated: 2024-12-02 20:53| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Cisco IOS XE |
Affected:
Cisco IOS XE
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T03:14:17.087Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "103563",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/103563"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"name": "1040588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id/1040588"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2018-0177",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-12-02T19:11:03.524152Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-12-02T20:53:34.215Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Cisco IOS XE",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "Cisco IOS XE"
}
]
}
],
"datePublic": "2018-03-28T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-19",
"description": "CWE-19",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-04-02T09:57:01.000Z",
"orgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"shortName": "cisco"
},
"references": [
{
"name": "103563",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/103563"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"name": "1040588",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id/1040588"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2018-0177",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS XE",
"version": {
"version_data": [
{
"version_value": "Cisco IOS XE"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-19"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "103563",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103563"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"name": "1040588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040588"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "d1c1063e-7a18-46af-9102-31f8928bc633",
"assignerShortName": "cisco",
"cveId": "CVE-2018-0177",
"datePublished": "2018-03-28T22:00:00.000Z",
"dateReserved": "2017-11-27T00:00:00.000Z",
"dateUpdated": "2024-12-02T20:53:34.215Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://www.securityfocus.com/bid/103563\", \"name\": \"103563\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securitytracker.com/id/1040588\", \"name\": \"1040588\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T03:14:17.087Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2018-0177\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-12-02T19:11:03.524152Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-12-02T19:21:15.758Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"Cisco IOS XE\", \"versions\": [{\"status\": \"affected\", \"version\": \"Cisco IOS XE\"}]}], \"datePublic\": \"2018-03-28T00:00:00.000Z\", \"references\": [{\"url\": \"http://www.securityfocus.com/bid/103563\", \"name\": \"103563\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securitytracker.com/id/1040588\", \"name\": \"1040588\", \"tags\": [\"vdb-entry\", \"x_refsource_SECTRACK\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-19\", \"description\": \"CWE-19\"}]}], \"providerMetadata\": {\"orgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"shortName\": \"cisco\", \"dateUpdated\": \"2018-04-02T09:57:01.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"Cisco IOS XE\"}]}, \"product_name\": \"Cisco IOS XE\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://www.securityfocus.com/bid/103563\", \"name\": \"103563\", \"refsource\": \"BID\"}, {\"url\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4\", \"name\": \"https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securitytracker.com/id/1040588\", \"name\": \"1040588\", \"refsource\": \"SECTRACK\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"CWE-19\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2018-0177\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"psirt@cisco.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2018-0177\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-12-02T20:53:34.215Z\", \"dateReserved\": \"2017-11-27T00:00:00.000Z\", \"assignerOrgId\": \"d1c1063e-7a18-46af-9102-31f8928bc633\", \"datePublished\": \"2018-03-28T22:00:00.000Z\", \"assignerShortName\": \"cisco\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2018-AVI-156
Vulnerability from certfr_avis - Published: 2018-03-29 - Updated: 2018-03-29
De multiples vulnérabilités ont été découvertes dans les produits Cisco. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire à distance, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Cisco | N/A | Catalyst 4500 Supervisor Engine 6L-E (K10) | ||
| Cisco | N/A | Catalyst 4900M Switch (K5) | ||
| Cisco | IOS XE | Cisco IOS XE versions 16.x | ||
| Cisco | N/A | Catalyst 4500E Supervisor Engine 8-E (K10) | ||
| Cisco | N/A | Catalyst 4500E Supervisor Engine 8L-E (K10) | ||
| Cisco | N/A | Catalyst 4500 Supervisor Engine 6-E (K5) | ||
| Cisco | IOS XE | Cisco Catalyst 3850 et Cisco Catalyst 3650 exécutant Cisco IOS XE version 16.1.1 ou postérieure | ||
| Cisco | IOS | Cisco ISM-VPN installé sur une version vulnérable de Cisco IOS | ||
| Cisco | IOS XE | Cisco IOS ou Cisco IOS XE avec le protocole Internet Security Association and Key Management Protocol (ISAKMP) activé | ||
| Cisco | N/A | Cisco Catalyst Digital Building Series Switches – 8U | ||
| Cisco | N/A | Cisco Catalyst 2960-L Series Switches | ||
| Cisco | N/A | Cisco Catalyst Digital Building Series Switches – 8P | ||
| Cisco | IOS XE | Cisco IOS XE utilisant la fonctionnalité Zone-Based Policy Firewall et exécutant une des versions Everest-16.4.1, Everest-16.4.2, Everest-16.5.1, Everest-16.5.1b, Everest-16.6.1, Everest-16.6.1a | ||
| Cisco | N/A | Catalyst 4500 Supervisor Engine 7L-E (K10) | ||
| Cisco | N/A | Cisco IOS, Cisco IOS XE ou Cisco IOS XR configurés pour utiliser LLDP | ||
| Cisco | N/A | Catalyst 4500-X Series Switches (K10) | ||
| Cisco | IOS XE | Cisco IOS ou IOS XE | ||
| Cisco | N/A | Catalyst 4500 Supervisor Engine 7-E (K10) | ||
| Cisco | N/A | Catalyst 4500E Supervisor Engine 9-E (K10) | ||
| Cisco | N/A | Catalyst 4948E Ethernet Switch (K5) | ||
| Cisco | IOS XE | Cisco IOS ou IOS XE avec la fonctionnalité Smart Install client activée |
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Catalyst 4500 Supervisor Engine 6L-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4900M Switch (K5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XE versions 16.x",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500E Supervisor Engine 8-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500E Supervisor Engine 8L-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500 Supervisor Engine 6-E (K5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 3850 et Cisco Catalyst 3650 ex\u00e9cutant Cisco IOS XE version 16.1.1 ou post\u00e9rieure",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco ISM-VPN install\u00e9 sur une version vuln\u00e9rable de Cisco IOS",
"product": {
"name": "IOS",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS ou Cisco IOS XE avec le protocole Internet Security Association and Key Management Protocol (ISAKMP) activ\u00e9",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst Digital Building Series Switches \u2013 8U",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst 2960-L Series Switches",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco Catalyst Digital Building Series Switches \u2013 8P",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS XE utilisant la fonctionnalit\u00e9 Zone-Based Policy Firewall et ex\u00e9cutant une des versions Everest-16.4.1, Everest-16.4.2, Everest-16.5.1, Everest-16.5.1b, Everest-16.6.1, Everest-16.6.1a",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500 Supervisor Engine 7L-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS, Cisco IOS XE ou Cisco IOS XR configur\u00e9s pour utiliser LLDP",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500-X Series Switches (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS ou IOS XE",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500 Supervisor Engine 7-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4500E Supervisor Engine 9-E (K10)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Catalyst 4948E Ethernet Switch (K5)",
"product": {
"name": "N/A",
"vendor": {
"name": "Cisco",
"scada": false
}
}
},
{
"description": "Cisco IOS ou IOS XE avec la fonctionnalit\u00e9 Smart Install client activ\u00e9e",
"product": {
"name": "IOS XE",
"vendor": {
"name": "Cisco",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2018-0171",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0171"
},
{
"name": "CVE-2018-0157",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0157"
},
{
"name": "CVE-2018-0174",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0174"
},
{
"name": "CVE-2018-0158",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0158"
},
{
"name": "CVE-2018-0167",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0167"
},
{
"name": "CVE-2018-0169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0169"
},
{
"name": "CVE-2018-0165",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0165"
},
{
"name": "CVE-2018-0151",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0151"
},
{
"name": "CVE-2018-0176",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0176"
},
{
"name": "CVE-2018-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0154"
},
{
"name": "CVE-2018-0172",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0172"
},
{
"name": "CVE-2018-0150",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0150"
},
{
"name": "CVE-2018-0170",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0170"
},
{
"name": "CVE-2018-0160",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0160"
},
{
"name": "CVE-2018-0159",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0159"
},
{
"name": "CVE-2018-0156",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0156"
},
{
"name": "CVE-2018-0161",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0161"
},
{
"name": "CVE-2018-0152",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0152"
},
{
"name": "CVE-2018-0173",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0173"
},
{
"name": "CVE-2018-0177",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0177"
},
{
"name": "CVE-2018-0175",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0175"
},
{
"name": "CVE-2018-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0155"
}
],
"initial_release_date": "2018-03-29T00:00:00",
"last_revision_date": "2018-03-29T00:00:00",
"links": [],
"reference": "CERTFR-2018-AVI-156",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2018-03-29T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Cisco.\nCertaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une\nex\u00e9cution de code arbitraire \u00e0 distance, un d\u00e9ni de service \u00e0 distance\net un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Cisco",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-lldp du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-lldp"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dhcpr2 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-snmp du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-fwip du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-fwip"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-bfd du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-bfd"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-opendns-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-opendns-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-privesc1 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-privesc1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-igmp du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-igmp"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-ike du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dhcpr3 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr3"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-qos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-qos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-xepriv du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xepriv"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-ipv4 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-snmp-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-snmp-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-xesc du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-xesc"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-smi2 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-ike-dos du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike-dos"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-dhcpr1 du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr1"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Cisco cisco-sa-20180328-smi du 28 mars 2018",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi"
}
]
}
GSD-2018-0177
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2018-0177",
"description": "A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714.",
"id": "GSD-2018-0177"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2018-0177"
],
"details": "A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714.",
"id": "GSD-2018-0177",
"modified": "2023-12-13T01:22:24.489849Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2018-0177",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cisco IOS XE",
"version": {
"version_data": [
{
"version_value": "Cisco IOS XE"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-19"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "103563",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/103563"
},
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4",
"refsource": "CONFIRM",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"name": "1040588",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id/1040588"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:denali-16.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:cisco:ios_xe:denali-16.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp2\\):-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp3\\):-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_c3850-12x48u-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_c3850-12x48u-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_c3850-12x48u-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
},
{
"cpe23Uri": "cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": false
}
],
"operator": "OR"
}
],
"cpe_match": [],
"operator": "AND"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "psirt@cisco.com",
"ID": "CVE-2018-0177"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"name": "1040588",
"refsource": "SECTRACK",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040588"
},
{
"name": "103563",
"refsource": "BID",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103563"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6
}
},
"lastModifiedDate": "2021-10-18T12:03Z",
"publishedDate": "2018-03-28T22:29Z"
}
}
}
GHSA-743Q-FPXW-3PXJ
Vulnerability from github – Published: 2022-05-13 01:05 – Updated: 2022-05-13 01:05A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714.
{
"affected": [],
"aliases": [
"CVE-2018-0177"
],
"database_specific": {
"cwe_ids": [],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2018-03-28T22:29:00Z",
"severity": "HIGH"
},
"details": "A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714.",
"id": "GHSA-743q-fpxw-3pxj",
"modified": "2022-05-13T01:05:39Z",
"published": "2022-05-13T01:05:39Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2018-0177"
},
{
"type": "WEB",
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/103563"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id/1040588"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"type": "CVSS_V3"
}
]
}
CNVD-2018-07763
Vulnerability from cnvd - Published: 2018-04-17厂商已发布了漏洞修复程序,请及时关注更新: https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4
| Name | ['Cisco Catalyst 3650 Series Switches 0', 'Cisco Catalyst 3850 Series'] |
|---|
{
"bids": {
"bid": {
"bidNumber": "103563"
}
},
"cves": {
"cve": {
"cveNumber": "CVE-2018-0177"
}
},
"description": "Cisco Catalyst 3850\u548cCatalyst 3650 Series Switches\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e0d\u540c\u7cfb\u5217\u7684\u4ea4\u6362\u673a\u8bbe\u5907\u3002IOS XE Software\u662f\u8fd0\u884c\u5728\u5176\u4e2d\u7684\u4e00\u5957Cisco\u8bbe\u5907\u4e13\u7528\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco Catalyst 3850\u548cCatalyst 3650 Series Switches\u4e2d\u7684IOS XE Software\u7684IP 4\u7248\u672c(IPv4)\u5904\u7406\u4ee3\u7801\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u5904\u7406IPv4\u6570\u636e\u5305\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5411\u8bbe\u5907\u7684IPv4\u5730\u5740\u53d1\u9001IPv4\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5927\u91cfCPU\u5360\u7528\u6216\u8bbe\u5907\u91cd\u65b0\u52a0\u8f7d\uff09\u3002",
"discovererName": "Cisco",
"formalWay": "\u5382\u5546\u5df2\u53d1\u5e03\u4e86\u6f0f\u6d1e\u4fee\u590d\u7a0b\u5e8f\uff0c\u8bf7\u53ca\u65f6\u5173\u6ce8\u66f4\u65b0\uff1a\r\nhttps://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4",
"isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
"number": "CNVD-2018-07763",
"openTime": "2018-04-17",
"patchDescription": "Cisco Catalyst 3850\u548cCatalyst 3650 Series Switches\u90fd\u662f\u7f8e\u56fd\u601d\u79d1\uff08Cisco\uff09\u516c\u53f8\u7684\u4e0d\u540c\u7cfb\u5217\u7684\u4ea4\u6362\u673a\u8bbe\u5907\u3002IOS XE Software\u662f\u8fd0\u884c\u5728\u5176\u4e2d\u7684\u4e00\u5957Cisco\u8bbe\u5907\u4e13\u7528\u7684\u64cd\u4f5c\u7cfb\u7edf\u3002\r\n\r\nCisco Catalyst 3850\u548cCatalyst 3650 Series Switches\u4e2d\u7684IOS XE Software\u7684IP 4\u7248\u672c(IPv4)\u5904\u7406\u4ee3\u7801\u5b58\u5728\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\uff0c\u8be5\u6f0f\u6d1e\u7a0b\u5e8f\u672a\u80fd\u6b63\u786e\u5904\u7406IPv4\u6570\u636e\u5305\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u901a\u8fc7\u5411\u8bbe\u5907\u7684IPv4\u5730\u5740\u53d1\u9001IPv4\u6570\u636e\u5305\u5229\u7528\u8be5\u6f0f\u6d1e\u9020\u6210\u62d2\u7edd\u670d\u52a1\uff08\u5927\u91cfCPU\u5360\u7528\u6216\u8bbe\u5907\u91cd\u65b0\u52a0\u8f7d\uff09\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
"patchName": "Cisco Catalyst 3850\u548cCatalyst 3650 Series Switches IOS XE Software\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e\u7684\u8865\u4e01",
"products": {
"product": [
"Cisco Catalyst 3650 Series Switches 0",
"Cisco Catalyst 3850 Series"
]
},
"referenceLink": "https://www.securityfocus.com/bid/103563",
"serverity": "\u9ad8",
"submitTime": "2018-03-29",
"title": "Cisco Catalyst 3850\u548cCatalyst 3650 Series Switches IOS XE Software\u62d2\u7edd\u670d\u52a1\u6f0f\u6d1e"
}
FKIE_CVE-2018-0177
Vulnerability from fkie_nvd - Published: 2018-03-28 22:29 - Updated: 2024-11-21 03:37| URL | Tags | ||
|---|---|---|---|
| psirt@cisco.com | http://www.securityfocus.com/bid/103563 | Third Party Advisory, VDB Entry | |
| psirt@cisco.com | http://www.securitytracker.com/id/1040588 | Third Party Advisory, VDB Entry | |
| psirt@cisco.com | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103563 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040588 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4 | Vendor Advisory |
| Vendor | Product | Version | |
|---|---|---|---|
| cisco | ios_xe | denali-16.3.1 | |
| cisco | ios_xe | denali-16.3.3 | |
| cisco | 4321_integrated_services_router | - | |
| cisco | 4331_integrated_services_router | - | |
| cisco | 4351_integrated_services_router | - | |
| cisco | 4431_integrated_services_router | - | |
| cisco | 4451-x_integrated_services_router | - | |
| cisco | asr_1000_series_route_processor_\(rp2\) | - | |
| cisco | asr_1000_series_route_processor_\(rp3\) | - | |
| cisco | asr_1001-hx | - | |
| cisco | asr_1001-x | - | |
| cisco | asr_1002-hx | - | |
| cisco | asr_1002-x | - | |
| cisco | catalyst_3650-12x48fd-e | - | |
| cisco | catalyst_3650-12x48fd-l | - | |
| cisco | catalyst_3650-12x48fd-s | - | |
| cisco | catalyst_3650-12x48uq-e | - | |
| cisco | catalyst_3650-12x48uq-l | - | |
| cisco | catalyst_3650-12x48uq-s | - | |
| cisco | catalyst_3650-12x48ur-e | - | |
| cisco | catalyst_3650-12x48ur-l | - | |
| cisco | catalyst_3650-12x48ur-s | - | |
| cisco | catalyst_3650-12x48uz-e | - | |
| cisco | catalyst_3650-24pd-e | - | |
| cisco | catalyst_3650-24pd-l | - | |
| cisco | catalyst_3650-24pd-s | - | |
| cisco | catalyst_3650-24pdm-e | - | |
| cisco | catalyst_3650-24pdm-l | - | |
| cisco | catalyst_3650-24pdm-s | - | |
| cisco | catalyst_3650-24ps-e | - | |
| cisco | catalyst_3650-24ps-l | - | |
| cisco | catalyst_3650-24ps-s | - | |
| cisco | catalyst_3650-24td-e | - | |
| cisco | catalyst_3650-24td-l | - | |
| cisco | catalyst_3650-24td-s | - | |
| cisco | catalyst_3650-24ts-e | - | |
| cisco | catalyst_3650-24ts-l | - | |
| cisco | catalyst_3650-24ts-s | - | |
| cisco | catalyst_3650-48fd-e | - | |
| cisco | catalyst_3650-48fd-l | - | |
| cisco | catalyst_3650-48fd-s | - | |
| cisco | catalyst_3650-48fq-e | - | |
| cisco | catalyst_3650-48fq-l | - | |
| cisco | catalyst_3650-48fq-s | - | |
| cisco | catalyst_3650-48fqm-e | - | |
| cisco | catalyst_3650-48fqm-l | - | |
| cisco | catalyst_3650-48fqm-s | - | |
| cisco | catalyst_3650-48fs-e | - | |
| cisco | catalyst_3650-48fs-l | - | |
| cisco | catalyst_3650-48fs-s | - | |
| cisco | catalyst_3650-48pd-e | - | |
| cisco | catalyst_3650-48pd-l | - | |
| cisco | catalyst_3650-48pd-s | - | |
| cisco | catalyst_3650-48pq-e | - | |
| cisco | catalyst_3650-48pq-l | - | |
| cisco | catalyst_3650-48pq-s | - | |
| cisco | catalyst_3650-48ps-e | - | |
| cisco | catalyst_3650-48ps-l | - | |
| cisco | catalyst_3650-48ps-s | - | |
| cisco | catalyst_3650-48td-e | - | |
| cisco | catalyst_3650-48td-l | - | |
| cisco | catalyst_3650-48td-s | - | |
| cisco | catalyst_3650-48tq-e | - | |
| cisco | catalyst_3650-48tq-l | - | |
| cisco | catalyst_3650-48tq-s | - | |
| cisco | catalyst_3650-48ts-e | - | |
| cisco | catalyst_3650-48ts-l | - | |
| cisco | catalyst_3650-48ts-s | - | |
| cisco | catalyst_3650-8x24pd-e | - | |
| cisco | catalyst_3650-8x24pd-l | - | |
| cisco | catalyst_3650-8x24pd-s | - | |
| cisco | catalyst_3650-8x24uq-e | - | |
| cisco | catalyst_3650-8x24uq-l | - | |
| cisco | catalyst_3650-8x24uq-s | - | |
| cisco | catalyst_3850-12s-e | - | |
| cisco | catalyst_3850-12s-s | - | |
| cisco | catalyst_3850-12xs-e | - | |
| cisco | catalyst_3850-12xs-s | - | |
| cisco | catalyst_3850-16xs-e | - | |
| cisco | catalyst_3850-16xs-s | - | |
| cisco | catalyst_3850-24p-e | - | |
| cisco | catalyst_3850-24p-l | - | |
| cisco | catalyst_3850-24p-s | - | |
| cisco | catalyst_3850-24s-e | - | |
| cisco | catalyst_3850-24s-s | - | |
| cisco | catalyst_3850-24t-e | - | |
| cisco | catalyst_3850-24t-l | - | |
| cisco | catalyst_3850-24t-s | - | |
| cisco | catalyst_3850-24u-e | - | |
| cisco | catalyst_3850-24u-l | - | |
| cisco | catalyst_3850-24u-s | - | |
| cisco | catalyst_3850-24xs-e | - | |
| cisco | catalyst_3850-24xs-s | - | |
| cisco | catalyst_3850-24xu-e | - | |
| cisco | catalyst_3850-24xu-l | - | |
| cisco | catalyst_3850-24xu-s | - | |
| cisco | catalyst_3850-32xs-e | - | |
| cisco | catalyst_3850-32xs-s | - | |
| cisco | catalyst_3850-48f-e | - | |
| cisco | catalyst_3850-48f-l | - | |
| cisco | catalyst_3850-48f-s | - | |
| cisco | catalyst_3850-48p-e | - | |
| cisco | catalyst_3850-48p-l | - | |
| cisco | catalyst_3850-48p-s | - | |
| cisco | catalyst_3850-48t-e | - | |
| cisco | catalyst_3850-48t-l | - | |
| cisco | catalyst_3850-48t-s | - | |
| cisco | catalyst_3850-48u-e | - | |
| cisco | catalyst_3850-48u-l | - | |
| cisco | catalyst_3850-48u-s | - | |
| cisco | catalyst_3850-48xs-e | - | |
| cisco | catalyst_3850-48xs-f-e | - | |
| cisco | catalyst_3850-48xs-f-s | - | |
| cisco | catalyst_3850-48xs-s | - | |
| cisco | catalyst_c3850-12x48u-e | - | |
| cisco | catalyst_c3850-12x48u-l | - | |
| cisco | catalyst_c3850-12x48u-s | - | |
| cisco | cloud_services_router_1000v | - |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:o:cisco:ios_xe:denali-16.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E1EB9B03-EB19-43B7-9030-B831906A1885",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:cisco:ios_xe:denali-16.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "EF7E2D2F-747F-409B-9964-2E4BA96158EB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
},
{
"cpeMatch": [
{
"criteria": "cpe:2.3:h:cisco:4321_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9421DBEF-AE42-4234-B49F-FCC34B804D7F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:4331_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5419CB9F-241F-4431-914F-2659BE27BEA5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:4351_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7DE02DBE-EAD5-4F37-8AB7-DF46A605A0E2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:4431_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5720462A-BE6B-4E84-A1A1-01E80BBA86AD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:4451-x_integrated_services_router:-:*:*:*:*:*:*:*",
"matchCriteriaId": "818CEFA6-208C-43C3-8E43-474A93ADCF21",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp2\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "C02F9303-F9DF-4166-AB4B-8C26B9FAD109",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_1000_series_route_processor_\\(rp3\\):-:*:*:*:*:*:*:*",
"matchCriteriaId": "372CB4D6-BB22-4521-9C18-C0A663717168",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7594E307-AC80-41EC-AE94-07E664A7D701",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "09C913FF-63D5-43FB-8B39-598EF436BA5A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CD2794BD-C8CE-46EF-9857-1723FCF04E46",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*",
"matchCriteriaId": "444F688F-79D0-4F22-B530-7BD520080B8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48fd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EE4F60E-DF3D-4839-8731-7CF16DA8FF26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48fd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA5EEE3-A084-46B4-84C0-ADFD69800649",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48fd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "592F67D5-344B-49AF-A277-1089A40AC2FD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uq-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DB2A5355-BF40-437C-8683-A7A81DEE362C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uq-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "43F4B90E-3499-45D4-864D-18505E2149F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uq-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1B9BE6BA-6B2D-47C9-B8F1-3C9CE213948D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48ur-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5FCCFF-E491-474F-9B86-AB51D8244582",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48ur-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EA8464F8-D6D2-4165-ADE8-B40F7D8556C2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48ur-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "61007628-A81B-43E0-86DE-1F7DDAD9F1A7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-12x48uz-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C3F03C3-C0CA-4E9B-A99A-BE28153EB5C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24pd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A369CD35-1242-4556-A83D-BD69CC149CFA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24pd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AA2D1B9E-6234-4FD6-A003-AFBC8A4DC2E6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24pd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "784A1499-1F33-493D-B433-EB2550C03C19",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24pdm-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CECFC88D-5480-46E4-BF74-E11A514A8BDD",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24pdm-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E54D16A8-0407-41E3-9599-9A6F57E1AA75",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24pdm-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C94A9A21-C4F7-4EA4-95B1-DEA7DDA0F77D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24ps-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DF3818CC-8653-4A9E-A57B-950A15914D6B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24ps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7EDC790B-B42D-45DB-ACF5-A789F76C2BC4",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24ps-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2A6BC84-91F2-437D-9D2E-F8B3F5966767",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24td-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7F331F13-5D05-4213-B442-D48D8E22287B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A6E312F4-90DA-40E4-BCD1-92F41BEEEECF",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24td-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "CA32EA3F-946D-430D-B00F-939D828DD72C",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24ts-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D239A09C-34D2-4418-B538-03A1080B8479",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2C84561E-DD99-4433-9EF2-083F7C300123",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-24ts-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B29871BE-CA7D-4108-B46A-CBD539C9A2B8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39CD9189-6524-4157-B90E-FF6A81DE3599",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2CF1B702-643A-4AF2-B0AD-3C540CF85F2A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "96269625-CB31-4850-872B-B2C1321B13B6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fq-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BDE086A-3FE5-46E3-BD66-23D0AE5089BE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fq-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FA53775A-D3ED-4D34-8338-A384DBEB94E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fq-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DE7D4522-D6BB-467F-AF5D-4D753A89D524",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fqm-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0C680534-C663-40B0-A4AA-7F292EE60FE2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fqm-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BAF4F233-7B47-46ED-BDC5-A589BCFC0B39",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fqm-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4A528EC0-4650-4787-BE52-A588E7E38A31",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fs-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "53898E96-03D6-43A2-AE05-46C62464BD26",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fs-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "465917E5-8BF0-4BBB-85A0-DE8F516880C9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48fs-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D9FA66D9-E465-406E-A95C-608A1BE34D74",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48pd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4EFFE6E6-413F-48AC-B4CE-0F1058C48FC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48pd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1456B204-A2A5-4790-A684-7F50D692EC9F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48pd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "AD715BDD-7C74-4785-BEDF-75918F6FB37A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48pq-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CD10664-94D0-48C0-92EF-E8EA66841245",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48pq-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "071A47F9-FF35-4F2C-BF5D-897CAC8BC08A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48pq-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9E988448-36C9-47E0-9356-DA400EB824E3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48ps-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9D067EF9-00DB-4979-B12E-55749059A083",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48ps-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A9FA300A-44B1-44EE-8111-C1296EB0B638",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48ps-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8598A543-B30B-4BD4-9974-F432FFFDCDD7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48td-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "48DEBBAD-D28D-4784-BBD8-9FAD1710A919",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48td-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8A5FC516-6B48-4D77-B26D-FA097AC91D1A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48td-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7437E4-5C09-436C-AFBC-F6B6747A4339",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48tq-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "ECBC0277-4990-4DE7-AD80-20E8A6F561D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48tq-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "6E7DAF69-662B-4999-A6AD-AA528B53EAF7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48tq-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2DF90C70-A2B8-44A4-B4A1-2A1B48AA9D0A",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48ts-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D28306B1-3DDE-4444-9784-522B3D2163EE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48ts-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "9257D187-1F2D-40F4-8C87-78978DB56C3F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-48ts-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5BF4A033-FD9E-4B98-A0FD-CF6CD9BD3E5B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24pd-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C4AF8261-74E0-4F53-B82C-A7BA7559D7CB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24pd-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "25AE251E-E99F-4546-85B0-C57834B040B7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24pd-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C62FFCB9-4253-459B-9298-C252DA9177DB",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24uq-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B4C0250-DA0D-4CEE-99F4-C211163C6653",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24uq-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8E18C436-AC70-4E2E-8ED2-EEADFCE36CB2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3650-8x24uq-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8D453BF6-AB9F-4D47-B4DF-C25C67358FFE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-12s-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "5C2A8413-DF92-4690-8BC1-A21001BDF76B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-12s-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "882B8D8F-E154-45C3-BB47-5353167C9776",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-12xs-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "A54B4EB4-EB41-4522-B7AB-C30F96099EA3",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-12xs-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EAD7BE51-0BA6-4750-B274-A6E33D32B484",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-16xs-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D5B6123E-B86F-4EC8-95D6-4CE47A7D0AC2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-16xs-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C2305B8A-B8F2-4AF4-A86A-EFF11541D62D",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24p-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "44C3EF8E-DF88-46DC-8E06-B009F346D1D2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24p-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7E87F823-D924-4718-AD81-248A6C619531",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24p-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "0BA01B5E-9E7B-4EE6-9480-A82B753BBB82",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24s-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1FC866C9-BB98-4320-9FFA-F0960C560DA6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24s-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "79FB0F3E-BB66-47BB-A59F-2D4C123F9CBE",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24t-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C3AD7495-3DA2-4596-9620-CD36D7C561AC",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24t-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E492F3F8-4188-41E4-9A84-5E30C4AC3378",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24t-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "718F2FDC-9EA4-4C4C-8821-B15E56AF8101",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24u-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "BC04072A-9BBE-4A9D-AE39-054D93E0C6D8",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24u-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E45BCCD0-65BB-431F-B448-221C1595CD92",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24u-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F33BA722-0680-4074-8D03-41657F8CDCC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24xs-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "431570C7-74A1-4F7E-8FD0-690AEF0F823B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24xs-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "C5D22E15-E1E8-4115-A55F-5743CA9C5947",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24xu-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "7B240B20-CF48-4A72-9653-9D04D59C1391",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24xu-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "19D6AC73-67C9-4FA2-A361-FF08B0E3AF47",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-24xu-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "58430463-EA77-4DC9-ACDE-4DCF92CA2FC7",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-32xs-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "74CCD143-3D6E-4880-B275-ECF5B04238C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-32xs-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F0D3784F-C572-4A6F-83B9-BCF64D339BC9",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48f-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "E09C466B-CE87-4A57-B40B-88C94BAAF36B",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48f-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "D58FF034-8E07-4518-A858-5F16F22217E5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48f-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "376AD386-373D-4B24-966F-D11F76C9020F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48p-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2280CAA3-03F6-4168-8E50-A6B7132A3B0E",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48p-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2E0C1174-C789-4547-9899-F7FCD0905F92",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48p-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "EC366801-655A-403B-ACD9-3BB43802A3C5",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48t-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "1BD50BB2-BFD8-42F2-8C23-0D95187B01F2",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48t-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "05D4D7E4-B195-46D8-8A6B-6AA4B8357618",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48t-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "39600E51-4A21-4E5B-9FF9-E7C00AE86646",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48u-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B13D6D50-D0FA-4527-BED3-52560DDD5253",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48u-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "965BF315-D833-4711-97FC-512151113367",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48u-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "2A0ADEBE-3DA2-4850-8115-0AC937FB0A94",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48xs-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "04072C0F-78A2-4D10-87B2-52DC2537BA89",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48xs-f-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "DD5C080E-D5C4-47B2-A46C-4EB3051C5221",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48xs-f-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "41CEBEE0-DA67-4EE5-9BCF-263843053A8F",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_3850-48xs-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "FD262F58-C47F-439E-A9FF-D1C60120D306",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_c3850-12x48u-e:-:*:*:*:*:*:*:*",
"matchCriteriaId": "8B9D6819-2CFC-428A-8C51-F0D4C55D5B29",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_c3850-12x48u-l:-:*:*:*:*:*:*:*",
"matchCriteriaId": "B3ECDFFB-DAD1-4BF6-85E1-1E8F94F991EA",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:catalyst_c3850-12x48u-s:-:*:*:*:*:*:*:*",
"matchCriteriaId": "F80AC0C7-6E96-4A72-B330-33BAF004B4C6",
"vulnerable": false
},
{
"criteria": "cpe:2.3:h:cisco:cloud_services_router_1000v:-:*:*:*:*:*:*:*",
"matchCriteriaId": "4CCB8270-A01D-40A6-BF4B-26BAF65E68F3",
"vulnerable": false
}
],
"negate": false,
"operator": "OR"
}
],
"operator": "AND"
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714."
},
{
"lang": "es",
"value": "Una vulnerabilidad en el c\u00f3digo de procesamiento IPv4 (IP Version 4) de Cisco IOS XE Software, ejecut\u00e1ndose en los switches Cisco Catalyst 3850 y Cisco Catalyst 3650 Series, podr\u00eda permitir que un atacante remoto no autenticado provoque que haya un consumo elevado de recursos de CPU, que pueda leer trazas del sistema o que reinicie el dispositivo afectado para provocar una denegaci\u00f3n de servicio (DoS). Esta vulnerabilidad se debe a un procesamiento incorrecto de ciertos paquetes IPv4. Un atacante podr\u00eda explotar esta vulnerabilidad enviando paquetes IPv4 espec\u00edficos a una direcci\u00f3n IPv4 en un dispositivo afectado. Una explotaci\u00f3n exitosa podr\u00eda permitir al atacante provocar que haya un consumo elevado de recursos de CPU, que pueda leer trazas del sistema o que reinicie el dispositivo afectado para provocar una denegaci\u00f3n de servicio (DoS). Si el switch no se reinicia al sufrir un ataque, ser\u00eda necesario intervenir de forma manual para recargar el dispositivo. Esta vulnerabilidad afecta a los switches Cisco Catalyst 3850 y Cisco Catalyst 3650 Series que ejecutan Cisco IOS XE Software Release 16.1.1 o posteriores, hasta el primer release con soluci\u00f3n, que est\u00e9n configurados con una direcci\u00f3n IPv4. Cisco Bug IDs: CSCvd80714."
}
],
"id": "CVE-2018-0177",
"lastModified": "2024-11-21T03:37:40.253",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 7.8,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 6.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2018-03-28T22:29:01.407",
"references": [
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103563"
},
{
"source": "psirt@cisco.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040588"
},
{
"source": "psirt@cisco.com",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/103563"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1040588"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ipv4"
}
],
"sourceIdentifier": "psirt@cisco.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-19"
}
],
"source": "psirt@cisco.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.