A vulnerability in the Smart Install feature of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to trigger a reload of an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to improper validation of packet data. An attacker could exploit this vulnerability by sending a crafted packet to an affected device on TCP port 4786. Only Smart Install client switches are affected. Cisco devices that are configured as a Smart Install director are not affected by this vulnerability. Cisco Bug IDs: CSCvd40673.
References
Link | Resource |
---|---|
http://www.securityfocus.com/bid/103569 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040596 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 | Third Party Advisory US Government Resource |
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 | Third Party Advisory US Government Resource |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi | Vendor Advisory |
http://www.securityfocus.com/bid/103569 | Third Party Advisory VDB Entry |
http://www.securitytracker.com/id/1040596 | Third Party Advisory VDB Entry |
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 | Third Party Advisory US Government Resource |
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05 | Third Party Advisory US Government Resource |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
History
21 Nov 2024, 03:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/103569Â - Third Party Advisory, VDB Entry | |
References | () http://www.securitytracker.com/id/1040596Â - Third Party Advisory, VDB Entry | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04Â - Third Party Advisory, US Government Resource | |
References | () https://ics-cert.us-cert.gov/advisories/ICSA-18-107-05Â - Third Party Advisory, US Government Resource | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-smi - Vendor Advisory |
Information
Published : 2018-03-28 22:29
Updated : 2024-11-21 03:37
NVD link : CVE-2018-0156
Mitre link : CVE-2018-0156
CVE.ORG link : CVE-2018-0156
JSON object : View
Products Affected
cisco
- catalyst_3750x-24t-e
- catalyst_3750x-24p-s
- catalyst_2960s-24ts-l
- ie_2000-8tc-g-e
- catalyst_3560x-48pf-e
- catalyst_2960x-48fps-l
- catalyst_4500_supervisor_engine_6l-e
- catalyst_2960xr-24td-i
- catalyst_2960-plus_48tc-s
- ie_2000-4ts
- catalyst_3750x-48t-e
- catalyst_3750x-48pf-l
- catalyst_3750x-24p-l
- catalyst_2960xr-24ts-i
- embedded_service_2020_ncp_b
- catalyst_2960-plus_24pc-l
- ie-3010-24tc
- catalyst_2960x-24ts-l
- ie_2000-16tc-g
- ie_2000-8tc-g
- catalyst_2960-plus_24lc-l
- catalyst_2960c-12pc-l
- catalyst_2960s-48ts-s
- catalyst_3560cg-8tc-s
- catalyst_2960cg-8tc-l
- catalyst_2960c-8tc-l
- ie_2000-4s-ts-g
- ie_3000-8tc
- catalyst_2960s-f48fps-l
- catalyst_3560x-48t-e
- catalyst_2960-plus_24pc-s
- catalyst_2960s-48fps-l
- catalyst_2960xr-48lps-i
- catalyst_3750x-24s-e
- catalyst_3560x-48u-e
- catalyst_3750x-12s-e
- embedded_service_2020_con_b
- ie_2000-4ts-g
- catalyst_3560x-24p-e
- ie_2000-8tc-g-n
- catalyst_2960c-8tc-s
- catalyst_2960s-48lps-l
- catalyst_3560x-24u-e
- catalyst_2960s-24td-l
- catalyst_3750x-24s-s
- catalyst_2960x-24ps-l
- catalyst_2960s-f24ts-l
- catalyst_2960s-f48ts-s
- catalyst_2960x-48ts-ll
- catalyst_2960x-48lpd-l
- catalyst_2960x-48lps-l
- ie_3000-4tc
- catalyst_3750x-24t-s
- catalyst_4900m
- catalyst_2960xr-48td-i
- ie_2000-16tc-g-x
- catalyst_2960s-48td-l
- catalyst_2960x-24psq-l_cool
- catalyst_2960s-48lpd-l
- catalyst_2960x-48fpd-l
- catalyst_3750x-48t-l
- catalyst_3560x-48pf-s
- catalyst_2960xr-48fpd-i
- catalyst_3560x-48p-e
- catalyst_2960xr-48ts-i
- catalyst_3560x-24u-l
- catalyst_3750x-24u-l
- embedded_service_2020_con
- catalyst_2960-plus_48pst-s
- catalyst_3560x-48t-l
- ie_2000-16ptc-g
- ie_2000-8t67
- catalyst_2960s-f48ts-l
- catalyst_2960s-24ps-l
- catalyst_3750x-48p-l
- catalyst_2960c-8pc-l
- catalyst_2960s-48ts-l
- catalyst_2960x-24ts-ll
- catalyst_3560cg-8pc-s
- catalyst_3560x-48p-l
- embedded_service_2020_24tc_ncp
- ie_2000-24t67
- catalyst_2960-plus_48pst-l
- catalyst_2960x-24pd-l
- catalyst_4948e-f
- catalyst_3560x-48u-l
- ios
- catalyst_3750x-24t-l
- catalyst_3560x-48pf-l
- embedded_service_2020_24tc_con_b
- catalyst_3750x-48p-e
- catalyst_3750x-48p-s
- catalyst_2960-plus_48tc-l
- catalyst_3750x-12s-s
- catalyst_3560x-48p-s
- catalyst_3750x-48t-s
- catalyst_3750x-48pf-e
- catalyst_2960-plus_24tc-l
- catalyst_2960xr-24ps-i
- catalyst_2960s-24pd-l
- catalyst_2960xr-48fps-i
- catalyst_3750x-48pf-s
- ie_2000-16tc-g-n
- catalyst_3560x-24p-s
- ie_2000-4t
- ie_2000-16tc-g-e
- catalyst_2960xr-48lpd-i
- ie_2000-4t-g
- catalyst_3560x-48u-s
- ie_2000-16tc
- catalyst_2960cpd-8tt-l
- ie_2000-8tc
- catalyst_3560cpd-8pt-s
- catalyst_2960s-48fpd-l
- catalyst_3750x-48u-s
- catalyst_3560x-24t-l
- catalyst_3560x-24t-e
- catalyst_2960cpd-8pt-l
- catalyst_2960-plus_24lc-s
- catalyst_2960s-f24ts-s
- embedded_service_2020_24tc_ncp_b
- catalyst_3560x-24u-s
- ie_2000-16t67
- catalyst_2960x-48ts-l
- catalyst_4500_supervisor_engine_6-e
- catalyst_3750x-24u-s
- catalyst_3560x-24p-l
- ios_xe
- catalyst_4948e
- ie-3010-16s-8pc
- catalyst_3750x-24u-e
- catalyst_2960x-24td-l
- catalyst_2960xr-24pd-i
- catalyst_3750x-48u-l
- catalyst_3560c-8pc-s
- catalyst_3750x-24p-e
- embedded_service_2020_ncp
- catalyst_3750x-48u-e
- embedded_service_2020_24tc_con
- catalyst_2960s-24ts-s
- catalyst_3560x-48t-s
- catalyst_3560c-12pc-s
- catalyst_2960s-f24ps-l
- catalyst_2960x-48td-l
- catalyst_3560x-24t-s
- catalyst_2960-plus_24tc-s
- catalyst_2960s-f48lps-l
- ie_2000-16t67p
- ie_2000-8t67p