ID

VAR-201806-0996


CVE

CVE-2018-0311


TITLE

Cisco FXOS and NX-OS Software resource management vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-006811

DESCRIPTION

A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packets when the software processes packet data. An attacker could exploit this vulnerability by sending a maliciously crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow condition on the device, which could cause process crashes and result in a DoS condition on the device. This vulnerability affects Firepower 4100 Series Next-Generation Firewalls, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvd69960, CSCve02463, CSCve04859, CSCve41530, CSCve41537, CSCve41541, CSCve41557. Vendors have confirmed this vulnerability Bug ID CSCvd69960 , CSCve02463 , CSCve04859 , CSCve41530 , CSCve41537 , CSCve41541 , CSCve41557 It is released as.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco Firepower 4100 Series Next-Generation Firewalls and so on are all products of Cisco. The Cisco Firepower 4100 Series Next-Generation Firewall is a 4100 series firewall device. MDS9000SeriesMultilayerSwitches is a switch device. FXOSSoftware is a suite of firewall software running on Cisco security appliances. NX-OSSoftware is a suite of data center-level operating system software running on Cisco switch devices. FabricServices is one of the Fabric service components

Trust: 2.25

sources: NVD: CVE-2018-0311 // JVNDB: JVNDB-2018-006811 // CNVD: CNVD-2018-12392 // VULHUB: VHN-118513

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-12392

AFFECTED PRODUCTS

vendor:ciscomodel:nx-osscope:eqversion:6.0\(2\)a8\(9\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:7.3\(3\)n1\(1\)

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:ltversion:2.0.1.153

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:ltversion:2.1.1.86

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:ltversion:2.2.1.70

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:ltversion:1.1.4.179

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:gteversion:2.2.1

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.0\(1\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(3\)i6\(2\)

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:gteversion:2.0

Trust: 1.0

vendor:ciscomodel:nx-osscope:ltversion:3.2\(b\)

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.1\(0.2\)s0

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:gteversion:2.1.1

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:gteversion:2.2.2

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.8\(0.1\)

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:ltversion:2.2.2.17

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:8.8\(3.5\)s0

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(0\)hsk\(0.357\)

Trust: 1.0

vendor:ciscomodel:firepower extensible operating systemscope:gteversion:1.1

Trust: 1.0

vendor:ciscomodel:nx-osscope:eqversion:7.0\(3\)i4\(7\)

Trust: 1.0

vendor:ciscomodel:nx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:fx-osscope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus series switchescope:eqversion:3000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7700

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5600

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5500

Trust: 0.6

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:2000

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3500

Trust: 0.6

vendor:ciscomodel:firepower security appliancescope:eqversion:9300

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:70000

Trust: 0.6

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:9500

Trust: 0.6

vendor:ciscomodel:mds series multilayer switchesscope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:ucs series fabric interconnectsscope:eqversion:6100

Trust: 0.6

vendor:ciscomodel:ucs series fabric interconnectsscope:eqversion:6200

Trust: 0.6

vendor:ciscomodel:ucs series fabric interconnectsscope:eqversion:6300

Trust: 0.6

vendor:ciscomodel:firepower series next-generation firewallsscope:eqversion:41000

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(2\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)sv1\(5.1\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3c\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1a\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n2\(1\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)sv1\(4a\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.0\(4\)sv1\(3d\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)n1\(1\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)sv1\(4\)

Trust: 0.6

vendor:ciscomodel:nx-osscope:eqversion:4.2\(1\)

Trust: 0.6

sources: CNVD: CNVD-2018-12392 // JVNDB: JVNDB-2018-006811 // CNNVD: CNNVD-201806-1121 // NVD: CVE-2018-0311

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0311
value: HIGH

Trust: 1.0

NVD: CVE-2018-0311
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-12392
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201806-1121
value: HIGH

Trust: 0.6

VULHUB: VHN-118513
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0311
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-12392
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118513
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0311
baseSeverity: HIGH
baseScore: 7.5
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 3.6
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-12392 // VULHUB: VHN-118513 // JVNDB: JVNDB-2018-006811 // CNNVD: CNNVD-201806-1121 // NVD: CVE-2018-0311

PROBLEMTYPE DATA

problemtype:CWE-399

Trust: 1.9

problemtype:CWE-119

Trust: 1.1

sources: VULHUB: VHN-118513 // JVNDB: JVNDB-2018-006811 // NVD: CVE-2018-0311

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201806-1121

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201806-1121

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-006811

PATCH

title:cisco-sa-20180620-nx-os-fabric-services-dosurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-nx-os-fabric-services-dos

Trust: 0.8

title:Patches for several Cisco Product Denial of Service Vulnerabilities (CNVD-2018-12392)url:https://www.cnvd.org.cn/patchInfo/show/133295

Trust: 0.6

title:Multiple Cisco product FXOS Software and NX-OS Software Fabric Services Fixes for component resource management error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=81452

Trust: 0.6

sources: CNVD: CNVD-2018-12392 // JVNDB: JVNDB-2018-006811 // CNNVD: CNNVD-201806-1121

EXTERNAL IDS

db:NVDid:CVE-2018-0311

Trust: 3.1

db:SECTRACKid:1041169

Trust: 1.7

db:JVNDBid:JVNDB-2018-006811

Trust: 0.8

db:CNNVDid:CNNVD-201806-1121

Trust: 0.7

db:CNVDid:CNVD-2018-12392

Trust: 0.6

db:VULHUBid:VHN-118513

Trust: 0.1

sources: CNVD: CNVD-2018-12392 // VULHUB: VHN-118513 // JVNDB: JVNDB-2018-006811 // CNNVD: CNNVD-201806-1121 // NVD: CVE-2018-0311

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180620-nx-os-fabric-services-dos

Trust: 2.3

url:http://www.securitytracker.com/id/1041169

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0311

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0311

Trust: 0.8

sources: CNVD: CNVD-2018-12392 // VULHUB: VHN-118513 // JVNDB: JVNDB-2018-006811 // CNNVD: CNNVD-201806-1121 // NVD: CVE-2018-0311

SOURCES

db:CNVDid:CNVD-2018-12392
db:VULHUBid:VHN-118513
db:JVNDBid:JVNDB-2018-006811
db:CNNVDid:CNNVD-201806-1121
db:NVDid:CVE-2018-0311

LAST UPDATE DATE

2024-11-23T21:38:49.259000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-12392date:2018-06-30T00:00:00
db:VULHUBid:VHN-118513date:2019-10-09T00:00:00
db:JVNDBid:JVNDB-2018-006811date:2018-08-31T00:00:00
db:CNNVDid:CNNVD-201806-1121date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0311date:2024-11-21T03:37:57.213

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-12392date:2018-06-30T00:00:00
db:VULHUBid:VHN-118513date:2018-06-21T00:00:00
db:JVNDBid:JVNDB-2018-006811date:2018-08-31T00:00:00
db:CNNVDid:CNNVD-201806-1121date:2018-06-22T00:00:00
db:NVDid:CVE-2018-0311date:2018-06-21T11:29:00.663