CVE-2018-0171
Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
YesDecision
Descriptions
A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.
Una vulnerabilidad en la característica Smart Install de Cisco IOS Software y Cisco IOS XE Software podría permitir que un atacante remoto no autenticado desencadene la recarga de un dispositivo afectado. Esto resulta en una condición de denegación de servicio (DoS) o en la ejecución de código arbitrario en un dispositivo afectado. Esta vulnerabilidad se debe a la validación incorrecta de datos del paquete. Un atacante podría explotar esta vulnerabilidad enviando un mensaje Smart Install manipulado al dispositivo afectado en el puerto TCP 4786. Su explotación con éxito podría permitir que el atacante provoque un desbordamiento de búfer en el dispositivo afectado, lo que podría provocar los siguientes impactos: Desencadenar la recarga del dispositivo, permitir que el atacante ejecute código arbitrario en el dispositivo, provocar un bucle impreciso en el dispositivo afectado que desencadene un cierre inesperado del watchdog. Cisco Bug IDs: CSCvg76186.
Cisco IOS and IOS XE Software improperly validates packet data, allowing an unauthenticated, remote attacker to trigger a reload of an affected device, cause a denial-of-service (DoS) condition, or perform code execution on the affected device.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2017-11-27 CVE Reserved
- 2018-03-28 CVE Published
- 2018-03-29 First Exploit
- 2021-11-03 Exploited in Wild
- 2022-05-03 KEV Due Date
- 2024-04-12 EPSS Updated
- 2024-11-13 CVE Updated
CWE
- CWE-20: Improper Input Validation
- CWE-787: Out-of-bounds Write
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/103538 | Third Party Advisory | |
http://www.securitytracker.com/id/1040580 | Third Party Advisory | |
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 | Third Party Advisory | |
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 | Third Party Advisory | |
https://www.darkreading.com/perimeter/attackers-exploit-cisco-switch-issue-as-vendor-warns-of-yet-another-critical-flaw/d/d-id/1331490 | Media Coverage |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/44451 | 2018-03-29 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi2 | 2020-09-04 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.2\(5\)e Search vendor "Cisco" for product "Ios" and version "15.2\(5\)e" | - |
Affected
|