CVE-2018-0158

A vulnerability in the Internet Key Exchange Version 2 (IKEv2) module of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, remote attacker to cause a memory leak or a reload of an affected device that leads to a denial of service (DoS) condition. The vulnerability is due to incorrect processing of certain IKEv2 packets. An attacker could exploit this vulnerability by sending crafted IKEv2 packets to an affected device to be processed. A successful exploit could cause an affected device to continuously consume memory and eventually reload, resulting in a DoS condition. Cisco Bug IDs: CSCvf22394.
References
Link Resource
http://www.securityfocus.com/bid/103566 Broken Link Third Party Advisory VDB Entry
http://www.securitytracker.com/id/1040595 Broken Link Third Party Advisory VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03 Third Party Advisory US Government Resource VDB Entry
https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 Third Party Advisory US Government Resource VDB Entry
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-ike Vendor Advisory
Configurations

Configuration 1 (hide)

AND
OR cpe:2.3:o:cisco:ios:15.5\(3\)s1.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.7:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.8:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.9:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.10:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.11:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.12:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*

Configuration 2 (hide)

AND
OR cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.7:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.8:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.9:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.10:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.11:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.12:*:*:*:*:*:*:*
OR cpe:2.3:h:cisco:asr_1001-hx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1001-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-hx:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1002-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1004:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1006:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1006-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1009-x:-:*:*:*:*:*:*:*
cpe:2.3:h:cisco:asr_1013:-:*:*:*:*:*:*:*

Configuration 3 (hide)

AND
OR cpe:2.3:o:cisco:ios:15.5\(3\)s1.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.7:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.8:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.9:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.10:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.11:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios:15.5\(3\)s1.12:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.1:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.2:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.4:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.5:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.7:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.8:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.9:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.10:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.11:*:*:*:*:*:*:*
cpe:2.3:o:cisco:ios_xe:15.5\(3\)s1.12:*:*:*:*:*:*:*
cpe:2.3:h:rockwellautomation:allen-bradley_stratix_5900:-:*:*:*:*:*:*:*

History

16 Jul 2024, 17:25

Type Values Removed Values Added
References () http://www.securityfocus.com/bid/103566 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/103566 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id/1040595 - Third Party Advisory, VDB Entry () http://www.securitytracker.com/id/1040595 - Broken Link, Third Party Advisory, VDB Entry
References () https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03 - US Government Resource, VDB Entry () https://ics-cert.us-cert.gov/advisories/ICSA-18-107-03 - Third Party Advisory, US Government Resource, VDB Entry
References () https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 - US Government Resource, VDB Entry () https://ics-cert.us-cert.gov/advisories/ICSA-18-107-04 - Third Party Advisory, US Government Resource, VDB Entry
CWE CWE-772 CWE-401

Information

Published : 2018-03-28 22:29

Updated : 2024-07-16 17:25


NVD link : CVE-2018-0158

Mitre link : CVE-2018-0158

CVE.ORG link : CVE-2018-0158


JSON object : View

Products Affected

rockwellautomation

  • allen-bradley_stratix_5900

cisco

  • asr_1006-x
  • asr_1001-hx
  • asr_1006
  • ios_xe
  • asr_1001-x
  • asr_1002-hx
  • ios
  • asr_1013
  • asr_1009-x
  • asr_1002-x
  • asr_1004
CWE
CWE-401

Missing Release of Memory after Effective Lifetime

CWE-20

Improper Input Validation