A vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state. While this vulnerability potentially affects all TCP applications, the only affected application observed so far is the HTTP server. An attacker could exploit this vulnerability by sending specific HTTP requests at a sustained rate to a reachable IP address of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device.

Project Subscriptions

Vendors Products
Catalyst 2960-plus 24lc-l Subscribe
Catalyst 2960-plus 24lc-s Subscribe
Catalyst 2960-plus 24pc-l Subscribe
Catalyst 2960-plus 24pc-s Subscribe
Catalyst 2960-plus 24tc-l Subscribe
Catalyst 2960-plus 24tc-s Subscribe
Catalyst 2960-plus 48pst-l Subscribe
Catalyst 2960-plus 48pst-s Subscribe
Catalyst 2960-plus 48tc-l Subscribe
Catalyst 2960-plus 48tc-s Subscribe
Catalyst 2960c-12pc-l Subscribe
Catalyst 2960c-8pc-l Subscribe
Catalyst 2960c-8tc-l Subscribe
Catalyst 2960c-8tc-s Subscribe
Catalyst 2960cg-8tc-l Subscribe
Catalyst 2960cpd-8pt-l Subscribe
Catalyst 2960cpd-8tt-l Subscribe
Catalyst 2960s-24pd-l Subscribe
Catalyst 2960s-24ps-l Subscribe
Catalyst 2960s-24td-l Subscribe
Catalyst 2960s-24ts-l Subscribe
Catalyst 2960s-48fpd-l Subscribe
Catalyst 2960s-48fps-l Subscribe
Catalyst 2960s-48lpd-l Subscribe
Catalyst 2960s-48lps-l Subscribe
Catalyst 2960s-48td-l Subscribe
Catalyst 2960s-48ts-l Subscribe
Catalyst 2960s-48ts-s Subscribe
Catalyst 2960s-f24ps-l Subscribe
Catalyst 2960s-f24ts-l Subscribe
Catalyst 2960s-f24ts-s Subscribe
Catalyst 2960s-f48fps-l Subscribe
Catalyst 2960s-f48lps-l Subscribe
Catalyst 2960s-f48ts-l Subscribe
Catalyst 2960s-f48ts-s Subscribe
Catalyst 2960x-24pd-l Subscribe
Catalyst 2960x-24ps-l Subscribe
Catalyst 2960x-24psq-l Subscribe
Catalyst 2960x-24td-l Subscribe
Catalyst 2960x-24ts-l Subscribe
Catalyst 2960x-24ts-ll Subscribe
Catalyst 2960x-48fpd-l Subscribe
Catalyst 2960x-48fps-l Subscribe
Catalyst 2960x-48lpd-l Subscribe
Catalyst 2960x-48lps-l Subscribe
Catalyst 2960x-48td-l Subscribe
Catalyst 2960x-48ts-l Subscribe
Catalyst 2960x-48ts-ll Subscribe
Catalyst 2960xr-24pd-i Subscribe
Catalyst 2960xr-24ps-i Subscribe
Catalyst 2960xr-24td-i Subscribe
Catalyst 2960xr-24ts-i Subscribe
Catalyst 2960xr-48fpd-i Subscribe
Catalyst 2960xr-48fps-i Subscribe
Catalyst 2960xr-48lpd-i Subscribe
Catalyst 2960xr-48lps-i Subscribe
Catalyst 2960xr-48td-i Subscribe
Catalyst 2960xr-48ts-i Subscribe
Catalyst 3560c-12pc-s Subscribe
Catalyst 3560c-8pc-s Subscribe
Catalyst 3560cg-8pc-s Subscribe
Catalyst 3560cg-8tc-s Subscribe
Catalyst 3560cpd-8pt-s Subscribe
Catalyst 3560x-24p-e Subscribe
Catalyst 3560x-24p-l Subscribe
Catalyst 3560x-24p-s Subscribe
Catalyst 3560x-24t-e Subscribe
Catalyst 3560x-24t-l Subscribe
Catalyst 3560x-24t-s Subscribe
Catalyst 3560x-24u-e Subscribe
Catalyst 3560x-24u-l Subscribe
Catalyst 3560x-24u-s Subscribe
Catalyst 3560x-48p-e Subscribe
Catalyst 3560x-48p-l Subscribe
Catalyst 3560x-48p-s Subscribe
Catalyst 3560x-48pf-e Subscribe
Catalyst 3560x-48pf-l Subscribe
Catalyst 3560x-48pf-s Subscribe
Catalyst 3560x-48t-e Subscribe
Catalyst 3560x-48t-l Subscribe
Catalyst 3560x-48t-s Subscribe
Catalyst 3560x-48u-e Subscribe
Catalyst 3560x-48u-l Subscribe
Catalyst 3560x-48u-s Subscribe
Catalyst 3750x-12s-e Subscribe
Catalyst 3750x-12s-s Subscribe
Catalyst 3750x-24p-e Subscribe
Catalyst 3750x-24p-l Subscribe
Catalyst 3750x-24p-s Subscribe
Catalyst 3750x-24s-e Subscribe
Catalyst 3750x-24s-s Subscribe
Catalyst 3750x-24t-e Subscribe
Catalyst 3750x-24t-l Subscribe
Catalyst 3750x-24t-s Subscribe
Catalyst 3750x-24u-e Subscribe
Catalyst 3750x-24u-l Subscribe
Catalyst 3750x-24u-s Subscribe
Catalyst 3750x-48p-e Subscribe
Catalyst 3750x-48p-l Subscribe
Catalyst 3750x-48p-s Subscribe
Catalyst 3750x-48pf-e Subscribe
Catalyst 3750x-48pf-l Subscribe
Catalyst 3750x-48pf-s Subscribe
Catalyst 3750x-48t-e Subscribe
Catalyst 3750x-48t-l Subscribe
Catalyst 3750x-48t-s Subscribe
Catalyst 3750x-48u-e Subscribe
Catalyst 3750x-48u-l Subscribe
Catalyst 3750x-48u-s Subscribe
Catalyst 4500 Supervisor Engine 6-e Subscribe
Catalyst 4500 Supervisor Engine 6l-e Subscribe
Catalyst 4900m Subscribe
Catalyst 4948e Subscribe
Catalyst 4948e-f Subscribe
Embedded Service 2020 24tc Con Subscribe
Embedded Service 2020 24tc Con B Subscribe
Embedded Service 2020 24tc Ncp Subscribe
Embedded Service 2020 24tc Ncp B Subscribe
Embedded Service 2020 Con Subscribe
Embedded Service 2020 Con B Subscribe
Embedded Service 2020 Ncp Subscribe
Embedded Service 2020 Ncp B Subscribe
Ie-3010-16s-8pc Subscribe
Ie-3010-24tc Subscribe
Ie 2000-16ptc-g Subscribe
Ie 2000-16t67 Subscribe
Ie 2000-16t67p Subscribe
Ie 2000-16tc Subscribe
Ie 2000-16tc-g Subscribe
Ie 2000-16tc-g-e Subscribe
Ie 2000-16tc-g-n Subscribe
Ie 2000-16tc-g-x Subscribe
Ie 2000-24t67 Subscribe
Ie 2000-4s-ts-g Subscribe
Ie 2000-4t Subscribe
Ie 2000-4t-g Subscribe
Ie 2000-4ts Subscribe
Ie 2000-4ts-g Subscribe
Ie 2000-8t67 Subscribe
Ie 2000-8t67p Subscribe
Ie 2000-8tc Subscribe
Ie 2000-8tc-g Subscribe
Ie 2000-8tc-g-e Subscribe
Ie 2000-8tc-g-n Subscribe
Ie 3000-4tc Subscribe
Ie 3000-8tc Subscribe
Sm-x Layer 2\/3 Etherswitch Service Module Subscribe
Advisories
Source ID Title
EUVD EUVD EUVD-2018-1105 A vulnerability in the TCP socket code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause an affected device to reload. The vulnerability is due to a state condition between the socket state and the transmission control block (TCB) state. While this vulnerability potentially affects all TCP applications, the only affected application observed so far is the HTTP server. An attacker could exploit this vulnerability by sending specific HTTP requests at a sustained rate to a reachable IP address of the affected software. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a denial of service (DoS) condition on an affected device.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 21 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: cisco

Published:

Updated: 2024-11-21T19:49:52.226Z

Reserved: 2017-11-27T00:00:00

Link: CVE-2018-0282

cve-icon Vulnrichment

Updated: 2024-08-05T03:21:14.918Z

cve-icon NVD

Status : Modified

Published: 2019-01-10T00:29:00.297

Modified: 2024-11-21T03:37:53.353

Link: CVE-2018-0282

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses