Description
A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714.
Published: 2018-03-28
Score: 7.5 High
EPSS: 2.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2018-1000 A vulnerability in the IP Version 4 (IPv4) processing code of Cisco IOS XE Software running on Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches could allow an unauthenticated, remote attacker to cause high CPU utilization, traceback messages, or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IPv4 packets. An attacker could exploit this vulnerability by sending specific IPv4 packets to an IPv4 address on an affected device. A successful exploit could allow the attacker to cause high CPU utilization, traceback messages, or a reload of the affected device that leads to a DoS condition. If the switch does not reboot when under attack, it would require manual intervention to reload the device. This vulnerability affects Cisco Catalyst 3850 and Cisco Catalyst 3650 Series Switches that are running Cisco IOS XE Software Release 16.1.1 or later, until the first fixed release, and are configured with an IPv4 address. Cisco Bug IDs: CSCvd80714.
History

Mon, 02 Dec 2024 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Subscriptions

Cisco 4321 Integrated Services Router 4331 Integrated Services Router 4351 Integrated Services Router 4431 Integrated Services Router 4451-x Integrated Services Router Asr 1000 Series Route Processor \(rp2\) Asr 1000 Series Route Processor \(rp3\) Asr 1001-hx Asr 1001-x Asr 1002-hx Asr 1002-x Catalyst 3650-12x48fd-e Catalyst 3650-12x48fd-l Catalyst 3650-12x48fd-s Catalyst 3650-12x48uq-e Catalyst 3650-12x48uq-l Catalyst 3650-12x48uq-s Catalyst 3650-12x48ur-e Catalyst 3650-12x48ur-l Catalyst 3650-12x48ur-s Catalyst 3650-12x48uz-e Catalyst 3650-24pd-e Catalyst 3650-24pd-l Catalyst 3650-24pd-s Catalyst 3650-24pdm-e Catalyst 3650-24pdm-l Catalyst 3650-24pdm-s Catalyst 3650-24ps-e Catalyst 3650-24ps-l Catalyst 3650-24ps-s Catalyst 3650-24td-e Catalyst 3650-24td-l Catalyst 3650-24td-s Catalyst 3650-24ts-e Catalyst 3650-24ts-l Catalyst 3650-24ts-s Catalyst 3650-48fd-e Catalyst 3650-48fd-l Catalyst 3650-48fd-s Catalyst 3650-48fq-e Catalyst 3650-48fq-l Catalyst 3650-48fq-s Catalyst 3650-48fqm-e Catalyst 3650-48fqm-l Catalyst 3650-48fqm-s Catalyst 3650-48fs-e Catalyst 3650-48fs-l Catalyst 3650-48fs-s Catalyst 3650-48pd-e Catalyst 3650-48pd-l Catalyst 3650-48pd-s Catalyst 3650-48pq-e Catalyst 3650-48pq-l Catalyst 3650-48pq-s Catalyst 3650-48ps-e Catalyst 3650-48ps-l Catalyst 3650-48ps-s Catalyst 3650-48td-e Catalyst 3650-48td-l Catalyst 3650-48td-s Catalyst 3650-48tq-e Catalyst 3650-48tq-l Catalyst 3650-48tq-s Catalyst 3650-48ts-e Catalyst 3650-48ts-l Catalyst 3650-48ts-s Catalyst 3650-8x24pd-e Catalyst 3650-8x24pd-l Catalyst 3650-8x24pd-s Catalyst 3650-8x24uq-e Catalyst 3650-8x24uq-l Catalyst 3650-8x24uq-s Catalyst 3850-12s-e Catalyst 3850-12s-s Catalyst 3850-12xs-e Catalyst 3850-12xs-s Catalyst 3850-16xs-e Catalyst 3850-16xs-s Catalyst 3850-24p-e Catalyst 3850-24p-l Catalyst 3850-24p-s Catalyst 3850-24s-e Catalyst 3850-24s-s Catalyst 3850-24t-e Catalyst 3850-24t-l Catalyst 3850-24t-s Catalyst 3850-24u-e Catalyst 3850-24u-l Catalyst 3850-24u-s Catalyst 3850-24xs-e Catalyst 3850-24xs-s Catalyst 3850-24xu-e Catalyst 3850-24xu-l Catalyst 3850-24xu-s Catalyst 3850-32xs-e Catalyst 3850-32xs-s Catalyst 3850-48f-e Catalyst 3850-48f-l Catalyst 3850-48f-s Catalyst 3850-48p-e Catalyst 3850-48p-l Catalyst 3850-48p-s Catalyst 3850-48t-e Catalyst 3850-48t-l Catalyst 3850-48t-s Catalyst 3850-48u-e Catalyst 3850-48u-l Catalyst 3850-48u-s Catalyst 3850-48xs-e Catalyst 3850-48xs-f-e Catalyst 3850-48xs-f-s Catalyst 3850-48xs-s Catalyst C3850-12x48u-e Catalyst C3850-12x48u-l Catalyst C3850-12x48u-s Cloud Services Router 1000v Ios Xe
cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-12-02T20:53:34.215Z

Reserved: 2017-11-27T00:00:00.000Z

Link: CVE-2018-0177

cve-icon Vulnrichment

Updated: 2024-08-05T03:14:17.087Z

cve-icon NVD

Status : Modified

Published: 2018-03-28T22:29:01.407

Modified: 2024-11-21T03:37:40.253

Link: CVE-2018-0177

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses