CVE-2018-0094

A vulnerability in IPv6 ingress packet processing for Cisco UCS Central Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition due to high CPU utilization on the targeted device. The vulnerability is due to insufficient rate limiting protection for IPv6 ingress traffic. An attacker could exploit this vulnerability by sending the affected device a high rate of IPv6 packets. Successful exploitation could allow the attacker to cause a DoS condition due to CPU and resource constraints. Cisco Bug IDs: CSCuv34544.
Configurations

Configuration 1 (hide)

cpe:2.3:a:cisco:unified_computing_system_central_software:1.4\(1a\):*:*:*:*:*:*:*

History

21 Nov 2024, 03:37

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/102787 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/102787 - Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040249 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040249 - Third Party Advisory, VDB Entry
References () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-ucs - Vendor Advisory () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180117-ucs - Vendor Advisory

Information

Published : 2018-01-18 06:29

Updated : 2024-11-21 03:37


NVD link : CVE-2018-0094

Mitre link : CVE-2018-0094

CVE.ORG link : CVE-2018-0094


JSON object : View

Products Affected

cisco

  • unified_computing_system_central_software
CWE
CWE-693

Protection Mechanism Failure

CWE-400

Uncontrolled Resource Consumption