// For flags

CVE-2018-0485

Cisco IOS and IOS XE Software SM-1T3/E3 Service Module Denial of Service Vulnerability

Severity Score

8.6
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A vulnerability in the SM-1T3/E3 firmware on Cisco Second Generation Integrated Services Routers (ISR G2) and the Cisco 4451-X Integrated Services Router (ISR4451-X) could allow an unauthenticated, remote attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of user input. An attacker could exploit this vulnerability by first connecting to the SM-1T3/E3 module console and entering a string sequence. A successful exploit could allow the attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a DoS condition on an affected device.

Una vulnerabilidad en el firmware SM-1T3/E3 en Cisco Second Generation Integrated Services Routers (ISR G2) y Cisco 4451-X Integrated Services Router (ISR4451-X) podría permitir que un atacante remoto no autenticado provoque que el router ISR G2 o el módulo SM-1T3/E3 en ISR4451-X se recargue, resultando en una denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a un manejo incorrecto de las entradas proporcionadas por el usuario. Un atacante podría explotar esta vulnerabilidad conectándose a la consola del módulo SM-1T3/E3 e introduciendo una secuencia de cadenas. Su explotación con éxito podría permitir que el atacante haga que el router ISR G2 o el módulo SM-1T3/E3 en ISR4451-X se recarguen, lo que resulta en una condición de denegación de servicio (DoS) en un dispositivo afectado.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
None
Integrity
None
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
None
Integrity
None
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2017-11-27 CVE Reserved
  • 2018-10-05 CVE Published
  • 2024-07-11 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-19: Data Processing Errors
  • CWE-20: Improper Input Validation
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Cisco
Search vendor "Cisco"
Ios
Search vendor "Cisco" for product "Ios"
15.6\(3\)m
Search vendor "Cisco" for product "Ios" and version "15.6\(3\)m"
-
Affected
Cisco
Search vendor "Cisco"
Ios Xe
Search vendor "Cisco" for product "Ios Xe"
--
Affected