ID

VAR-201803-1389


CVE

CVE-2018-0173


TITLE

Cisco IOS Software and Cisco IOS XE Software input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-003507

DESCRIPTION

A vulnerability in the Cisco IOS Software and Cisco IOS XE Software function that restores encapsulated option 82 information in DHCP Version 4 (DHCPv4) packets could allow an unauthenticated, remote attacker to cause an affected device to reload, resulting in a Relay Reply denial of service (DoS) condition. The vulnerability exists because the affected software performs incomplete input validation of encapsulated option 82 information that it receives in DHCPOFFER messages from DHCPv4 servers. An attacker could exploit this vulnerability by sending a crafted DHCPv4 packet to an affected device, which the device would then forward to a DHCPv4 server. When the affected software processes the option 82 information that is encapsulated in the response from the server, an error could occur. A successful exploit could allow the attacker to cause the affected device to reload, resulting in a DoS condition. Cisco Bug IDs: CSCvg62754. Cisco IOS Software and Cisco IOS XE The software contains an input validation vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvg62754 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state

Trust: 2.61

sources: NVD: CVE-2018-0173 // JVNDB: JVNDB-2018-003507 // CNVD: CNVD-2018-08181 // BID: 103545 // VULHUB: VHN-118375 // VULMON: CVE-2018-0173

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-08181

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:denali-16.3.4

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:denali-16.3.4

Trust: 1.6

vendor:ciscomodel:ios xescope: - version: -

Trust: 1.4

vendor:ciscomodel:iosscope: - version: -

Trust: 1.4

vendor:ciscomodel:ios xescope:lteversion:15.2\(6\)e0a

Trust: 1.0

vendor:ciscomodel:iosscope:lteversion:15.2\(4a\)ea5

Trust: 1.0

vendor:ciscomodel:ios xescope:lteversion:15.2\(4a\)ea5

Trust: 1.0

vendor:ciscomodel:iosscope:lteversion:15.2\(6\)e0a

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios denali-16.3.4scope: - version: -

Trust: 0.3

sources: CNVD: CNVD-2018-08181 // BID: 103545 // JVNDB: JVNDB-2018-003507 // CNNVD: CNNVD-201803-1020 // NVD: CVE-2018-0173

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0173
value: HIGH

Trust: 1.0

NVD: CVE-2018-0173
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-08181
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201803-1020
value: HIGH

Trust: 0.6

VULHUB: VHN-118375
value: HIGH

Trust: 0.1

VULMON: CVE-2018-0173
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0173
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-08181
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118375
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0173
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.1

Trust: 1.0

NVD: CVE-2018-0173
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-08181 // VULHUB: VHN-118375 // VULMON: CVE-2018-0173 // JVNDB: JVNDB-2018-003507 // CNNVD: CNNVD-201803-1020 // NVD: CVE-2018-0173

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-118375 // JVNDB: JVNDB-2018-003507 // NVD: CVE-2018-0173

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201803-1020

TYPE

input validation error

Trust: 0.6

sources: CNNVD: CNNVD-201803-1020

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003507

PATCH

title:cisco-sa-20180328-dhcpr2url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-dhcpr2

Trust: 0.8

title:Patch for Cisco IOS Software and IOSXESoftware Input Validation Vulnerability (CNVD-2018-08181)url:https://www.cnvd.org.cn/patchInfo/show/126869

Trust: 0.6

title:Cisco IOS Software and IOS XE Software Enter the fix for the verification vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79488

Trust: 0.6

title:Cisco: Cisco IOS and IOS XE Software DHCP Version 4 Relay Reply Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180328-dhcpr2

Trust: 0.1

title:Known Exploited Vulnerabilities Detectorurl:https://github.com/Ostorlab/KEV

Trust: 0.1

sources: CNVD: CNVD-2018-08181 // VULMON: CVE-2018-0173 // JVNDB: JVNDB-2018-003507 // CNNVD: CNNVD-201803-1020

EXTERNAL IDS

db:NVDid:CVE-2018-0173

Trust: 3.5

db:ICS CERTid:ICSA-18-107-04

Trust: 2.6

db:ICS CERTid:ICSA-18-107-05

Trust: 2.6

db:BIDid:103545

Trust: 2.1

db:SECTRACKid:1040591

Trust: 1.8

db:TENABLEid:TRA-2018-06

Trust: 1.8

db:JVNDBid:JVNDB-2018-003507

Trust: 0.8

db:CNVDid:CNVD-2018-08181

Trust: 0.6

db:CNNVDid:CNNVD-201803-1020

Trust: 0.6

db:VULHUBid:VHN-118375

Trust: 0.1

db:VULMONid:CVE-2018-0173

Trust: 0.1

sources: CNVD: CNVD-2018-08181 // VULHUB: VHN-118375 // VULMON: CVE-2018-0173 // BID: 103545 // JVNDB: JVNDB-2018-003507 // CNNVD: CNNVD-201803-1020 // NVD: CVE-2018-0173

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180328-dhcpr2

Trust: 2.8

url:https://ics-cert.us-cert.gov/advisories/icsa-18-107-05

Trust: 2.7

url:https://ics-cert.us-cert.gov/advisories/icsa-18-107-04

Trust: 2.6

url:http://www.securityfocus.com/bid/103545

Trust: 1.9

url:https://www.tenable.com/security/research/tra-2018-06

Trust: 1.8

url:http://www.securitytracker.com/id/1040591

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0173

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0173

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://github.com/ostorlab/kev

Trust: 0.1

sources: CNVD: CNVD-2018-08181 // VULHUB: VHN-118375 // VULMON: CVE-2018-0173 // BID: 103545 // JVNDB: JVNDB-2018-003507 // CNNVD: CNNVD-201803-1020 // NVD: CVE-2018-0173

CREDITS

Tenable

Trust: 0.3

sources: BID: 103545

SOURCES

db:CNVDid:CNVD-2018-08181
db:VULHUBid:VHN-118375
db:VULMONid:CVE-2018-0173
db:BIDid:103545
db:JVNDBid:JVNDB-2018-003507
db:CNNVDid:CNNVD-201803-1020
db:NVDid:CVE-2018-0173

LAST UPDATE DATE

2024-11-23T21:39:32.450000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-08181date:2018-04-24T00:00:00
db:VULHUBid:VHN-118375date:2019-10-09T00:00:00
db:VULMONid:CVE-2018-0173date:2019-10-09T00:00:00
db:BIDid:103545date:2018-03-28T00:00:00
db:JVNDBid:JVNDB-2018-003507date:2018-05-25T00:00:00
db:CNNVDid:CNNVD-201803-1020date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0173date:2024-11-21T03:37:39.563

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-08181date:2018-04-24T00:00:00
db:VULHUBid:VHN-118375date:2018-03-28T00:00:00
db:VULMONid:CVE-2018-0173date:2018-03-28T00:00:00
db:BIDid:103545date:2018-03-28T00:00:00
db:JVNDBid:JVNDB-2018-003507date:2018-05-25T00:00:00
db:CNNVDid:CNNVD-201803-1020date:2018-03-29T00:00:00
db:NVDid:CVE-2018-0173date:2018-03-28T22:29:01.170