A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
Metrics
No CVSS v4.0
Attack Vector Network
Attack Complexity Low
Privileges Required None
Scope Unchanged
Confidentiality Impact None
Integrity Impact None
Availability Impact High
User Interaction None
No CVSS v3.0
Access Vector Network
Access Complexity Low
Authentication None
Confidentiality Impact None
Integrity Impact None
Availability Impact Complete
AV:N/AC:L/Au:N/C:N/I:N/A:C
This CVE is in the KEV database since March 3, 2022.
Exploitation active
Automatable yes
Technical Impact partial
Affected Vendors & Products
Vendors | Products |
---|---|
Cisco |
|
Configuration 1 [-]
AND |
|
Configuration 2 [-]
AND |
|
No data.
References
History
Fri, 15 Nov 2024 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
kev
|
MITRE
Status: PUBLISHED
Assigner: cisco
Published: 2018-03-28T22:00:00
Updated: 2024-11-15T17:53:46.403Z
Reserved: 2017-11-27T00:00:00
Link: CVE-2018-0156
Vulnrichment
Updated: 2024-08-05T03:14:16.905Z
NVD
Status : Modified
Published: 2018-03-28T22:29:00.467
Modified: 2024-11-21T03:37:37.627
Link: CVE-2018-0156
Redhat
No data.