// For flags

CVE-2018-0421

Cisco Prime Access Registrar Denial of Service Vulnerability

Severity Score

8.6
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in TCP connection management in Cisco Prime Access Registrar could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition when the application unexpectedly restarts. The vulnerability is due to incorrect handling of incoming TCP SYN packets to specific listening ports. The improper handling of the TCP SYN packets could cause a system file description to be allocated and not freed. An attacker could exploit this vulnerability by sending a crafted stream of TCP SYN packets to the application. A successful exploit could allow the attacker to cause the application to eventually restart if a file description cannot be obtained.

Una vulnerabilidad en la administración de las conexiones TCP en Cisco Prime Access Registrar podría permitir que un atacante remoto sin autenticar provoque una denegación de servicio (DoS) cuando la aplicación se reinicia de manera inesperada. Esta vulnerabilidad se debe al manejo incorrecto de los paquetes TCP SYN en puertos de escucha específicos. El manejo incorrecto de los paquetes TCP SYN podría provocar que se asigne y no se libere una descripción de un archivo del sistema. Un atacante podría explotar esta vulnerabilidad enviando un flujo manipulado de paquetes TCP SYN a la aplicación. Su explotación con éxito podría permitir que el atacante provoque que la aplicación acabe por reiniciarse si no se puede obtener una descripción de archivo.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-10-05 CVE Published
  • 2024-06-20 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-399: Resource Management Errors
  • CWE-772: Missing Release of Resource after Effective Lifetime
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Prime Access Registrar
Search vendor "Cisco" for product "Prime Access Registrar"
>= 7.3 < 7.3.0.4
Search vendor "Cisco" for product "Prime Access Registrar" and version " >= 7.3 < 7.3.0.4"
-
Affected
Cisco
Search vendor "Cisco"
Prime Access Registrar
Search vendor "Cisco" for product "Prime Access Registrar"
>= 8.0 < 8.0.1.1
Search vendor "Cisco" for product "Prime Access Registrar" and version " >= 8.0 < 8.0.1.1"
-
Affected
Cisco
Search vendor "Cisco"
Prime Access Registrar Jumpstart
Search vendor "Cisco" for product "Prime Access Registrar Jumpstart"
>= 7.3 < 7.3.0.4
Search vendor "Cisco" for product "Prime Access Registrar Jumpstart" and version " >= 7.3 < 7.3.0.4"
-
Affected
Cisco
Search vendor "Cisco"
Prime Access Registrar Jumpstart
Search vendor "Cisco" for product "Prime Access Registrar Jumpstart"
>= 8.0 < 8.0.1.1
Search vendor "Cisco" for product "Prime Access Registrar Jumpstart" and version " >= 8.0 < 8.0.1.1"
-
Affected