CVE-2018-0090
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in management interface access control list (ACL) configuration of Cisco NX-OS System Software could allow an unauthenticated, remote attacker to bypass configured ACLs on the management interface. This could allow traffic to be forwarded to the NX-OS CPU for processing, leading to high CPU utilization and a denial of service (DoS) condition. The vulnerability is due to a bad code fix in the 7.3.2 code train that could allow traffic to the management interface to be misclassified and not match the proper configured ACLs. An attacker could exploit this vulnerability by sending crafted traffic to the management interface. An exploit could allow the attacker to bypass the configured management interface ACLs and impact the CPU of the targeted device, resulting in a DoS condition. This vulnerability affects the following Cisco products running Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode. Cisco Bug IDs: CSCvf31132.
Una vulnerabilidad en la configuración de la lista de control de acceso (ACL) de la interfaz de administración de Cisco NX-OS System Software podría permitir que un atacante remoto no autenticado omita las ACL configuradas en la interfaz de administración. Esto podría permitir que el tráfico se redirija a la CPU NX-OS para procesamiento, provocando un uso elevado de recursos de la CPU y una condición de denegación de servicio (DoS). La vulnerabilidad se debe a una mala solución en el tren de código 7.3.2 que podría permitir que la interfaz de administración se clasifique de manera incorrecta y no coincida con las listas de control de acceso configuradas correctamente. Un atacante podría explotar esta vulnerabilidad mediante el envío de tráfico manipulado a través de la interfaz de administración. Su explotación podría permitir que el atacante omita las listas de control de acceso de la interfaz de administración y afectar a la CPU del dispositivo afectado, resultando en una condición de denegación de servicio (DoS). Esta vulnerabilidad afecta a los siguientes productos de Cisco que ejecutan Cisco NX-OS System Software: Multilayer Director Switches, Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches en modo NX-OS standalone. Cisco Bug IDs: CSCvf31132.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-11-27 CVE Reserved
- 2018-01-18 CVE Published
- 2023-07-21 EPSS Updated
- 2024-08-05 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-20: Improper Input Validation
- CWE-400: Uncontrolled Resource Consumption
CAPEC
References (3)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/102753 | Third Party Advisory | |
http://www.securitytracker.com/id/1040247 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-nxos | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | 7.3\(2\)n1\(0.6\) Search vendor "Cisco" for product "Nx-os" and version "7.3\(2\)n1\(0.6\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | 8.3\(0\)kms\(0.31\) Search vendor "Cisco" for product "Nx-os" and version "8.3\(0\)kms\(0.31\)" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Nx-os Search vendor "Cisco" for product "Nx-os" | 8.8\(3.5\)s0 Search vendor "Cisco" for product "Nx-os" and version "8.8\(3.5\)s0" | - |
Affected
|