// For flags

CVE-2018-0171

Cisco IOS and IOS XE Software Smart Install Remote Code Execution Vulnerability

Severity Score

9.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition, or to execute arbitrary code on an affected device. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted Smart Install message to an affected device on TCP port 4786. A successful exploit could allow the attacker to cause a buffer overflow on the affected device, which could have the following impacts: Triggering a reload of the device, Allowing the attacker to execute arbitrary code on the device, Causing an indefinite loop on the affected device that triggers a watchdog crash. Cisco Bug IDs: CSCvg76186.

Una vulnerabilidad en la característica Smart Install de Cisco IOS Software y Cisco IOS XE Software podría permitir que un atacante remoto no autenticado desencadene la recarga de un dispositivo afectado. Esto resulta en una condición de denegación de servicio (DoS) o en la ejecución de código arbitrario en un dispositivo afectado. Esta vulnerabilidad se debe a la validación incorrecta de datos del paquete. Un atacante podría explotar esta vulnerabilidad enviando un mensaje Smart Install manipulado al dispositivo afectado en el puerto TCP 4786. Su explotación con éxito podría permitir que el atacante provoque un desbordamiento de búfer en el dispositivo afectado, lo que podría provocar los siguientes impactos: Desencadenar la recarga del dispositivo, permitir que el atacante ejecute código arbitrario en el dispositivo, provocar un bucle impreciso en el dispositivo afectado que desencadene un cierre inesperado del watchdog. Cisco Bug IDs: CSCvg76186.

Cisco IOS and IOS XE Software improperly validates packet data, allowing an unauthenticated, remote attacker to trigger a reload of an affected device, cause a denial-of-service (DoS) condition, or perform code execution on the affected device.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-03-28 CVE Published
  • 2018-03-29 First Exploit
  • 2021-11-03 Exploited in Wild
  • 2022-05-03 KEV Due Date
  • 2024-04-12 EPSS Updated
  • 2024-08-05 CVE Updated
CWE
  • CWE-20: Improper Input Validation
  • CWE-787: Out-of-bounds Write
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.2\(5\)e
Search vendor "Cisco" for product "Ios" and version "15.2\(5\)e"
-
Affected