ID

VAR-201801-1039


CVE

CVE-2018-0136


TITLE

Cisco IOS XR Software input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-001889

DESCRIPTION

A vulnerability in the IPv6 subsystem of Cisco IOS XR Software Release 5.3.4 for the Cisco Aggregation Services Router (ASR) 9000 Series could allow an unauthenticated, remote attacker to trigger a reload of one or more Trident-based line cards, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect handling of IPv6 packets with a fragment header extension. An attacker could exploit this vulnerability by sending IPv6 packets designed to trigger the issue either to or through the Trident-based line card. A successful exploit could allow the attacker to trigger a reload of Trident-based line cards, resulting in a DoS during the period of time the line card takes to restart. This vulnerability affects Cisco Aggregation Services Router (ASR) 9000 Series when the following conditions are met: The router is running Cisco IOS XR Software Release 5.3.4, and the router has installed Trident-based line cards that have IPv6 configured. A software maintenance upgrade (SMU) has been made available that addresses this vulnerability. The fix has also been incorporated into service pack 7 for Cisco IOS XR Software Release 5.3.4. Cisco Bug IDs: CSCvg46800. Vendors have confirmed this vulnerability Bug ID CSCvg46800 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. The Cisco AggregationServicesRouter (ASR) 9000 Series is a Cisco 9000 Series wireless controller product from Cisco. Cisco IOSXR Software is one of a modular, distributed network operating system

Trust: 2.52

sources: NVD: CVE-2018-0136 // JVNDB: JVNDB-2018-001889 // CNVD: CNVD-2018-04722 // BID: 102905 // VULHUB: VHN-118338

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-04722

AFFECTED PRODUCTS

vendor:ciscomodel:ios xrscope:eqversion:5.3.4

Trust: 2.4

vendor:ciscomodel:ios xr softwarescope:eqversion:5.3.4

Trust: 0.9

vendor:ciscomodel:asr series aggregation services routersscope:eqversion:90000

Trust: 0.9

vendor:ciscomodel:asr routerscope:eqversion:99220

Trust: 0.9

vendor:ciscomodel:asr routerscope:eqversion:99120

Trust: 0.9

vendor:ciscomodel:asr routerscope:eqversion:99040

Trust: 0.9

vendor:ciscomodel:asr routerscope:eqversion:90100

Trust: 0.9

vendor:ciscomodel:asr routerscope:eqversion:90060

Trust: 0.9

vendor:ciscomodel:asr routerscope:eqversion:90010

Trust: 0.9

sources: CNVD: CNVD-2018-04722 // BID: 102905 // JVNDB: JVNDB-2018-001889 // CNNVD: CNNVD-201801-1118 // NVD: CVE-2018-0136

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0136
value: HIGH

Trust: 1.0

NVD: CVE-2018-0136
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-04722
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201801-1118
value: HIGH

Trust: 0.6

VULHUB: VHN-118338
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0136
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-04722
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118338
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0136
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 1.0

NVD: CVE-2018-0136
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-04722 // VULHUB: VHN-118338 // JVNDB: JVNDB-2018-001889 // CNNVD: CNNVD-201801-1118 // NVD: CVE-2018-0136

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

problemtype:NVD-CWE-Other

Trust: 1.0

sources: VULHUB: VHN-118338 // JVNDB: JVNDB-2018-001889 // NVD: CVE-2018-0136

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201801-1118

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201801-1118

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-001889

PATCH

title:cisco-sa-20180131-ipv6url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180131-ipv6

Trust: 0.8

title:CiscoAggregationServicesRouter9000Series CiscoIOSXRSoftware Denial of Service Vulnerability Patchurl:https://www.cnvd.org.cn/patchInfo/show/120745

Trust: 0.6

sources: CNVD: CNVD-2018-04722 // JVNDB: JVNDB-2018-001889

EXTERNAL IDS

db:NVDid:CVE-2018-0136

Trust: 3.4

db:BIDid:102905

Trust: 2.6

db:SECTRACKid:1040315

Trust: 1.7

db:JVNDBid:JVNDB-2018-001889

Trust: 0.8

db:CNNVDid:CNNVD-201801-1118

Trust: 0.7

db:CNVDid:CNVD-2018-04722

Trust: 0.6

db:VULHUBid:VHN-118338

Trust: 0.1

sources: CNVD: CNVD-2018-04722 // VULHUB: VHN-118338 // BID: 102905 // JVNDB: JVNDB-2018-001889 // CNNVD: CNNVD-201801-1118 // NVD: CVE-2018-0136

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180131-ipv6

Trust: 2.6

url:http://www.securityfocus.com/bid/102905

Trust: 1.7

url:http://www.securitytracker.com/id/1040315

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0136

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0136

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2018-04722 // VULHUB: VHN-118338 // BID: 102905 // JVNDB: JVNDB-2018-001889 // CNNVD: CNNVD-201801-1118 // NVD: CVE-2018-0136

CREDITS

Cisco

Trust: 0.3

sources: BID: 102905

SOURCES

db:CNVDid:CNVD-2018-04722
db:VULHUBid:VHN-118338
db:BIDid:102905
db:JVNDBid:JVNDB-2018-001889
db:CNNVDid:CNNVD-201801-1118
db:NVDid:CVE-2018-0136

LAST UPDATE DATE

2024-11-23T22:07:01.509000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-04722date:2018-03-12T00:00:00
db:VULHUBid:VHN-118338date:2020-09-04T00:00:00
db:BIDid:102905date:2018-01-31T00:00:00
db:JVNDBid:JVNDB-2018-001889date:2018-03-14T00:00:00
db:CNNVDid:CNNVD-201801-1118date:2020-09-07T00:00:00
db:NVDid:CVE-2018-0136date:2024-11-21T03:37:35.470

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-04722date:2018-03-09T00:00:00
db:VULHUBid:VHN-118338date:2018-01-31T00:00:00
db:BIDid:102905date:2018-01-31T00:00:00
db:JVNDBid:JVNDB-2018-001889date:2018-03-14T00:00:00
db:CNNVDid:CNNVD-201801-1118date:2018-02-01T00:00:00
db:NVDid:CVE-2018-0136date:2018-01-31T20:29:00.663