CVE-2018-0485
Cisco IOS and IOS XE Software SM-1T3/E3 Service Module Denial of Service Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A vulnerability in the SM-1T3/E3 firmware on Cisco Second Generation Integrated Services Routers (ISR G2) and the Cisco 4451-X Integrated Services Router (ISR4451-X) could allow an unauthenticated, remote attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of user input. An attacker could exploit this vulnerability by first connecting to the SM-1T3/E3 module console and entering a string sequence. A successful exploit could allow the attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a DoS condition on an affected device.
Una vulnerabilidad en el firmware SM-1T3/E3 en Cisco Second Generation Integrated Services Routers (ISR G2) y Cisco 4451-X Integrated Services Router (ISR4451-X) podría permitir que un atacante remoto no autenticado provoque que el router ISR G2 o el módulo SM-1T3/E3 en ISR4451-X se recargue, resultando en una denegación de servicio (DoS) en un dispositivo afectado. Esta vulnerabilidad se debe a un manejo incorrecto de las entradas proporcionadas por el usuario. Un atacante podría explotar esta vulnerabilidad conectándose a la consola del módulo SM-1T3/E3 e introduciendo una secuencia de cadenas. Su explotación con éxito podría permitir que el atacante haga que el router ISR G2 o el módulo SM-1T3/E3 en ISR4451-X se recarguen, lo que resulta en una condición de denegación de servicio (DoS) en un dispositivo afectado.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2017-11-27 CVE Reserved
- 2018-10-05 CVE Published
- 2024-07-11 EPSS Updated
- 2024-09-16 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-19: Data Processing Errors
- CWE-20: Improper Input Validation
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
http://www.securityfocus.com/bid/105433 | Third Party Advisory | |
http://www.securitytracker.com/id/1041736 | Third Party Advisory | |
http://www.securitytracker.com/id/1041737 | Third Party Advisory |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-sm1t3e3 | 2019-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Cisco Search vendor "Cisco" | Ios Search vendor "Cisco" for product "Ios" | 15.6\(3\)m Search vendor "Cisco" for product "Ios" and version "15.6\(3\)m" | - |
Affected
| ||||||
Cisco Search vendor "Cisco" | Ios Xe Search vendor "Cisco" for product "Ios Xe" | - | - |
Affected
|