// For flags

CVE-2018-0151

Cisco IOS Software and Cisco IOS XE Software Quality of Service Remote Code Execution Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

A vulnerability in the quality of service (QoS) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges. The vulnerability is due to incorrect bounds checking of certain values in packets that are destined for UDP port 18999 of an affected device. An attacker could exploit this vulnerability by sending malicious packets to an affected device. When the packets are processed, an exploitable buffer overflow condition may occur. A successful exploit could allow the attacker to execute arbitrary code on the affected device with elevated privileges. The attacker could also leverage this vulnerability to cause the device to reload, causing a temporary DoS condition while the device is reloading. The malicious packets must be destined to and processed by an affected device. Traffic transiting a device will not trigger the vulnerability. Cisco Bug IDs: CSCvf73881.

Una vulnerabilidad en el subsistema "quality of service" (QoS) de Cisco IOS Software y Cisco IOS XE Software podría permitir que un atacante remoto no autenticado provoque una denegación de servicio (DoS) o ejecute código arbitrario con privilegios elevados. Esta vulnerabilidad se debe a una verificación incorrecta de límites de determinados valores en paquetes que están destinados al puerto 18999 UDP de un dispositivo afectado. Un atacante podría explotar esta vulnerabilidad enviando paquetes maliciosos a un dispositivo afectado. Al procesar los paquetes se puede dar una situación explotable de desbordamiento de búfer. Un exploit con éxito podría permitir que el atacante ejecute código arbitrario en el dispositivo afectado con privilegios elevados. El atacante también podría aprovechar esta vulnerabilidad para hacer que el dispositivo se reinicie, provocando una denegación de servicio (DoS) temporal mientras el dispositivo se reinicia. Los paquetes maliciosos tienen que ir destinados a un dispositivo afectado y estar procesados por él. El tráfico que transita en un dispositivo no dará lugar a la vulnerabilidad. Cisco Bug IDs: CSCvf73881.

A vulnerability in the quality of service (QoS) subsystem of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition or execute arbitrary code with elevated privileges.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
Yes
Tech. Impact
Total
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-03-28 CVE Published
  • 2022-03-03 Exploited in Wild
  • 2022-03-17 KEV Due Date
  • 2024-03-07 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
16.5.1
Search vendor "Cisco" for product "Ios Xe" and version "16.5.1"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
--
Affected