ID

VAR-201803-1608


CVE

CVE-2018-0189


TITLE

Cisco IOS Software and Cisco IOS XE Software resource management vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-003434

DESCRIPTION

A vulnerability in the Forwarding Information Base (FIB) code of Cisco IOS Software and Cisco IOS XE Software could allow an unauthenticated, network attacker to cause a denial of service (DoS) condition. The vulnerability is due to a limitation in the way the FIB is internally representing recursive routes. An attacker could exploit this vulnerability by injecting routes into the routing protocol that have a specific recursive pattern. The attacker must be in a position on the network that provides the ability to inject a number of recursive routes with a specific pattern. An exploit could allow the attacker to cause an affected device to reload, creating a DoS condition. Cisco Bug IDs: CSCva91655. Vendors have confirmed this vulnerability Bug ID CSCva91655 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state

Trust: 1.98

sources: NVD: CVE-2018-0189 // JVNDB: JVNDB-2018-003434 // BID: 103548 // VULHUB: VHN-118391

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:ltversion:15.2\(1\)e1

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:15.4\(2\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:15.5\(3\)s5

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:15.2\(2\)e1

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:15.2\(4\)e5

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:15.5\(3\)m5

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:15.4\(3\)s7

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:15.4\(1\)s1

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:15.4\(1\)s0a

Trust: 1.0

vendor:ciscomodel:ios xescope:ltversion:15.2\(5\)e1

Trust: 1.0

vendor:ciscomodel:iosscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.5s

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.4sg.1

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.4sg.4

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.6s

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.4sg.0

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.4sg.2

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.4sg.3

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.4s_3.4.4s

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.8.2s

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:3.4sg

Trust: 0.6

vendor:ciscomodel:me 3800x-24fs-m switch routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:me 3600x-24ts-m switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:me 3600x-24fs-m switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:me 3600x-24cx-m switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:me 44fa-d-k9 switchscope:eqversion:2600x0

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 15.4 sscope: - version: -

Trust: 0.3

vendor:ciscomodel:asr 901s-4sg-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901s-3sg-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901s-3sg-f-ah routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901s-2sg-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901s-2sg-f-ah routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-ft-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-ft-a routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-fs-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-fs-a routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-f-a routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-4c-ft-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-4c-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-12c-ft-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-12c-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:series supervisor enginescope:eqversion:76007200

Trust: 0.3

vendor:ciscomodel:series supervisor engine with multilayer switch featurescope:eqversion:7600320

Trust: 0.3

vendor:ciscomodel:series route switch processorscope:eqversion:76007200

Trust: 0.3

sources: BID: 103548 // JVNDB: JVNDB-2018-003434 // CNNVD: CNNVD-201803-1007 // NVD: CVE-2018-0189

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0189
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-0189
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201803-1007
value: MEDIUM

Trust: 0.6

VULHUB: VHN-118391
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0189
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-118391
severity: HIGH
baseScore: 7.1
vectorString: AV:N/AC:M/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0189
baseSeverity: MEDIUM
baseScore: 5.3
vectorString: CVSS:3.0/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: VULHUB: VHN-118391 // JVNDB: JVNDB-2018-003434 // CNNVD: CNNVD-201803-1007 // NVD: CVE-2018-0189

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: VULHUB: VHN-118391 // JVNDB: JVNDB-2018-003434 // NVD: CVE-2018-0189

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201803-1007

TYPE

resource management error

Trust: 0.6

sources: CNNVD: CNNVD-201803-1007

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-003434

PATCH

title:cisco-sa-20180328-FIB-dosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180328-FIB-dos

Trust: 0.8

title:Cisco IOS Software and IOS XE Software Remediation of resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=79475

Trust: 0.6

sources: JVNDB: JVNDB-2018-003434 // CNNVD: CNNVD-201803-1007

EXTERNAL IDS

db:NVDid:CVE-2018-0189

Trust: 2.8

db:BIDid:103548

Trust: 2.0

db:JVNDBid:JVNDB-2018-003434

Trust: 0.8

db:CNNVDid:CNNVD-201803-1007

Trust: 0.7

db:VULHUBid:VHN-118391

Trust: 0.1

sources: VULHUB: VHN-118391 // BID: 103548 // JVNDB: JVNDB-2018-003434 // CNNVD: CNNVD-201803-1007 // NVD: CVE-2018-0189

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180328-fib-dos

Trust: 2.0

url:http://www.securityfocus.com/bid/103548

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0189

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0189

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: VULHUB: VHN-118391 // BID: 103548 // JVNDB: JVNDB-2018-003434 // CNNVD: CNNVD-201803-1007 // NVD: CVE-2018-0189

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 103548

SOURCES

db:VULHUBid:VHN-118391
db:BIDid:103548
db:JVNDBid:JVNDB-2018-003434
db:CNNVDid:CNNVD-201803-1007
db:NVDid:CVE-2018-0189

LAST UPDATE DATE

2024-11-23T22:48:45.639000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-118391date:2019-10-09T00:00:00
db:BIDid:103548date:2018-03-28T00:00:00
db:JVNDBid:JVNDB-2018-003434date:2018-05-23T00:00:00
db:CNNVDid:CNNVD-201803-1007date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0189date:2024-11-21T03:37:41.763

SOURCES RELEASE DATE

db:VULHUBid:VHN-118391date:2018-03-28T00:00:00
db:BIDid:103548date:2018-03-28T00:00:00
db:JVNDBid:JVNDB-2018-003434date:2018-05-23T00:00:00
db:CNNVDid:CNNVD-201803-1007date:2018-03-29T00:00:00
db:NVDid:CVE-2018-0189date:2018-03-28T22:29:02