// For flags

CVE-2018-0090

 

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in management interface access control list (ACL) configuration of Cisco NX-OS System Software could allow an unauthenticated, remote attacker to bypass configured ACLs on the management interface. This could allow traffic to be forwarded to the NX-OS CPU for processing, leading to high CPU utilization and a denial of service (DoS) condition. The vulnerability is due to a bad code fix in the 7.3.2 code train that could allow traffic to the management interface to be misclassified and not match the proper configured ACLs. An attacker could exploit this vulnerability by sending crafted traffic to the management interface. An exploit could allow the attacker to bypass the configured management interface ACLs and impact the CPU of the targeted device, resulting in a DoS condition. This vulnerability affects the following Cisco products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode. Cisco Bug IDs: CSCvf31132.

Una vulnerabilidad en la configuración de la lista de control de acceso (ACL) de la interfaz de administración de Cisco NX-OS System Software podría permitir que un atacante remoto no autenticado omita las ACL configuradas en la interfaz de administración. Esto podría permitir que el tráfico se redirija a la CPU NX-OS para procesamiento, provocando un uso elevado de recursos de la CPU y una condición de denegación de servicio (DoS). La vulnerabilidad se debe a una mala solución en el tren de código 7.3.2 que podría permitir que la interfaz de administración se clasifique de manera incorrecta y no coincida con las listas de control de acceso configuradas correctamente. Un atacante podría explotar esta vulnerabilidad mediante el envío de tráfico manipulado a través de la interfaz de administración. Su explotación podría permitir que el atacante omita las listas de control de acceso de la interfaz de administración y afectar a la CPU del dispositivo afectado, resultando en una condición de denegación de servicio (DoS). Esta vulnerabilidad afecta a los siguientes productos de Cisco que ejecutan Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches en modo NX-OS standalone. Cisco Bug IDs: CSCvf31132.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-01-18 CVE Published
  • 2023-07-21 EPSS Updated
  • 2024-08-05 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-400: Uncontrolled Resource Consumption
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
7.3\(2\)n1\(0.6\)
Search vendor "Cisco" for product "Nx-os" and version "7.3\(2\)n1\(0.6\)"
-
Affected
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
8.3\(0\)kms\(0.31\)
Search vendor "Cisco" for product "Nx-os" and version "8.3\(0\)kms\(0.31\)"
-
Affected
Cisco
Search vendor "Cisco"
Nx-os
Search vendor "Cisco" for product "Nx-os"
8.8\(3.5\)s0
Search vendor "Cisco" for product "Nx-os" and version "8.8\(3.5\)s0"
-
Affected