Lucene search

K
cveCiscoCVE-2018-0172
HistoryMar 28, 2018 - 10:29 p.m.

CVE-2018-0172

2018-03-2822:29:01
CWE-787
CWE-20
cisco
web.nvd.nist.gov
884
In Wild
cisco
ios
xe
dhcp
vulnerability
dos
cisco bug id
nvd
cve-2018-0172

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

8.4

Confidence

High

EPSS

0.015

Percentile

87.4%

A vulnerability in the DHCP option 82 encapsulation functionality of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of option 82 information that it receives in DHCP Version 4 (DHCPv4) packets from DHCP relay agents. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device. A successful exploit could allow the attacker to cause a heap overflow condition on the affected device, which will cause the device to reload and result in a DoS condition. Cisco Bug IDs: CSCvg62730.

Affected configurations

Nvd
Node
ciscoiosMatch-
OR
ciscoios_xeMatch-
Node
ciscoiosMatch-
OR
ciscoios_xeMatch-
AND
rockwellautomationallen-bradley_armorstratix_5700Match-
OR
rockwellautomationallen-bradley_stratix_5400Match-
OR
rockwellautomationallen-bradley_stratix_5410Match-
OR
rockwellautomationallen-bradley_stratix_5700Match-
OR
rockwellautomationallen-bradley_stratix_8000Match-
OR
rockwellautomationallen-bradley_stratix_8300Match-
VendorProductVersionCPE
ciscoios-cpe:2.3:o:cisco:ios:-:*:*:*:*:*:*:*
ciscoios_xe-cpe:2.3:o:cisco:ios_xe:-:*:*:*:*:*:*:*
rockwellautomationallen-bradley_armorstratix_5700-cpe:2.3:h:rockwellautomation:allen-bradley_armorstratix_5700:-:*:*:*:*:*:*:*
rockwellautomationallen-bradley_stratix_5400-cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5400:-:*:*:*:*:*:*:*
rockwellautomationallen-bradley_stratix_5410-cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5410:-:*:*:*:*:*:*:*
rockwellautomationallen-bradley_stratix_5700-cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5700:-:*:*:*:*:*:*:*
rockwellautomationallen-bradley_stratix_8000-cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8000:-:*:*:*:*:*:*:*
rockwellautomationallen-bradley_stratix_8300-cpe:2.3:h:rockwellautomation:allen-bradley_stratix_8300:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "product": "Cisco IOS and IOS XE",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "Cisco IOS and IOS XE"
      }
    ]
  }
]

CVSS2

7.8

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:N/I:N/A:C

CVSS3

8.6

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

NONE

Integrity Impact

NONE

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H

AI Score

8.4

Confidence

High

EPSS

0.015

Percentile

87.4%