// For flags

CVE-2018-0159

Cisco IOS and XE Software Internet Key Exchange Version 1 Denial-of-Service Vulnerability

Severity Score

7.5
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

Act
*SSVC
Descriptions

A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of specific IKEv1 packets. An attacker could exploit this vulnerability by sending crafted IKEv1 packets to an affected device during an IKE negotiation. A successful exploit could allow the attacker to cause an affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCuj73916.

Una vulnerabilidad en la implementación de la funcionalidad Internet Key Exchange Version 1 (IKEv1) de Cisco IOS Software y Cisco IOS XE Software podría permitir que un atacante remoto no autenticado provoque el reinicio de un dispositivo afectado, lo que da como resultado una denegación de servicio (DoS). Esta vulnerabilidad se debe a la validación incorrecta de paquetes IKEv1 específicos. Un atacante podría explotar esta vulnerabilidad enviando paquetes IKEv1 manipulados al dispositivo afectado durante una negociación IKE. Un exploit con éxito, podría permitir que el atacante consiga que el dispositivo afectado se reinicie, lo que provoca una denegación de servicio. Cisco Bug IDs: CSCuj73916.

A vulnerability in the implementation of Internet Key Exchange Version 1 (IKEv1) functionality in Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial-of-service (DoS) condition.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:Act
Exploitation
Active
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-03-28 CVE Published
  • 2022-03-03 Exploited in Wild
  • 2022-03-17 KEV Due Date
  • 2024-09-21 EPSS Updated
  • 2024-11-15 CVE Updated
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-12c-f-d
Search vendor "Cisco" for product "Asr 901-12c-f-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-12c-ft-d
Search vendor "Cisco" for product "Asr 901-12c-ft-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-4c-f-d
Search vendor "Cisco" for product "Asr 901-4c-f-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-4c-ft-d
Search vendor "Cisco" for product "Asr 901-4c-ft-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-6cz-f-a
Search vendor "Cisco" for product "Asr 901-6cz-f-a"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-6cz-f-d
Search vendor "Cisco" for product "Asr 901-6cz-f-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-6cz-ft-a
Search vendor "Cisco" for product "Asr 901-6cz-ft-a"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-6cz-ft-d
Search vendor "Cisco" for product "Asr 901-6cz-ft-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Me 3600x-24cx-m
Search vendor "Cisco" for product "Me 3600x-24cx-m"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Me 3600x-24fs-m
Search vendor "Cisco" for product "Me 3600x-24fs-m"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Me 3600x-24ts-m
Search vendor "Cisco" for product "Me 3600x-24ts-m"
--
Safe
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.3\(3\)s
Search vendor "Cisco" for product "Ios" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Me 3800x-24fs-m
Search vendor "Cisco" for product "Me 3800x-24fs-m"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-12c-f-d
Search vendor "Cisco" for product "Asr 901-12c-f-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-12c-ft-d
Search vendor "Cisco" for product "Asr 901-12c-ft-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-4c-f-d
Search vendor "Cisco" for product "Asr 901-4c-f-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-4c-ft-d
Search vendor "Cisco" for product "Asr 901-4c-ft-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-6cz-f-a
Search vendor "Cisco" for product "Asr 901-6cz-f-a"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-6cz-f-d
Search vendor "Cisco" for product "Asr 901-6cz-f-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-6cz-ft-a
Search vendor "Cisco" for product "Asr 901-6cz-ft-a"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Asr 901-6cz-ft-d
Search vendor "Cisco" for product "Asr 901-6cz-ft-d"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Me 3600x-24cx-m
Search vendor "Cisco" for product "Me 3600x-24cx-m"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Me 3600x-24fs-m
Search vendor "Cisco" for product "Me 3600x-24fs-m"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Me 3600x-24ts-m
Search vendor "Cisco" for product "Me 3600x-24ts-m"
--
Safe
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
15.3\(3\)s
Search vendor "Cisco" for product "Ios Xe" and version "15.3\(3\)s"
-
Affected
in Cisco
Search vendor "Cisco"
Me 3800x-24fs-m
Search vendor "Cisco" for product "Me 3800x-24fs-m"
--
Safe