A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of SNMP protocol data units (PDUs) in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to an affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition. This vulnerability affects Nexus 2000 Series Switches, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 3600 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCuw99630, CSCvg71290, CSCvj67977.
References
Link | Resource |
---|---|
http://www.securitytracker.com/id/1041169 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxossnmp | Vendor Advisory |
http://www.securitytracker.com/id/1041169 | Third Party Advisory VDB Entry |
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxossnmp | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
AND |
|
Configuration 4 (hide)
AND |
|
Configuration 5 (hide)
AND |
|
Configuration 6 (hide)
AND |
|
Configuration 7 (hide)
AND |
|
History
21 Nov 2024, 03:37
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securitytracker.com/id/1041169 - Third Party Advisory, VDB Entry | |
References | () https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nxossnmp - Vendor Advisory |
Information
Published : 2018-06-20 21:29
Updated : 2024-11-21 03:37
NVD link : CVE-2018-0291
Mitre link : CVE-2018-0291
CVE.ORG link : CVE-2018-0291
JSON object : View
Products Affected
cisco
- nexus_56128p
- nexus_5696q
- nexus_3064-x
- nexus_5672up
- nexus_3064-32t
- nexus_3524-x
- nexus_3064-t
- nexus_3172pq-xl
- nexus_3548-xl
- nexus_3100-v
- nexus_31128pq
- nexus_5010
- nexus_3048
- nexus_9396tx
- nexus_3164q
- nexus_9516
- nexus_5596t
- nexus_7000
- nexus_5548p
- nexus_3636c-r
- nexus_5548up
- nexus_92160yc-x
- nexus_n9k-x9636q-r
- nexus_3132q-xl
- nexus_3548
- nexus_5000
- nx-os
- ucs_6332
- nexus_3264c-e
- nexus_n9k-c9508-fm-r
- nexus_9500
- nexus_7700
- ucs_6120xp
- nexus_93180yc-ex
- nexus_9508
- nexus_3132q
- nexus_9372px
- ucs_6296up
- nexus_3132c-z
- nexus_6001p
- nexus_5648q
- nexus_3524-xl
- nexus_5624q
- ucs_6248up
- nexus_3172tq-32t
- nexus_c36180yc-r
- nexus_3172tq
- nexus_9396px
- nexus_n9k-x9636c-r
- ucs_6324
- nexus_5020
- nexus_93128tx
- ucs_6140xp
- nexus_93120tx
- nexus_93108tc-ex
- nexus_9372tx
- nexus_6001t
- nexus_3548-x
- nexus_34180yc
- nexus_92304qc
- nexus_9504
- nexus_3172pq
- nexus_3016
- nexus_9236c
- nexus_3264q
- nexus_9332pq
- nexus_172tq-xl
- nexus_5596up
- nexus_9272q
- nexus_3232c
- nexus_3132q-x
CWE
CWE-20
Improper Input Validation