ID

VAR-201806-1000


CVE

CVE-2018-0315


TITLE

Cisco IOS XE Software buffer error vulnerability

Trust: 1.4

sources: JVNDB: JVNDB-2018-006127 // CNNVD: CNNVD-201806-400

DESCRIPTION

A vulnerability in the authentication, authorization, and accounting (AAA) security services of Cisco IOS XE Software could allow an unauthenticated, remote attacker to execute arbitrary code on an affected device or cause an affected device to reload, resulting in a denial of service (DoS) condition. The vulnerability is due to incorrect memory operations that the affected software performs when the software parses a username during login authentication. An attacker could exploit this vulnerability by attempting to authenticate to an affected device. A successful exploit could allow the attacker to execute arbitrary code on the affected device or cause the affected device to reload, resulting in a DoS condition. This vulnerability affects Cisco devices that are running Cisco IOS XE Software Release Fuji 16.7.1 or Fuji 16.8.1 and are configured to use AAA for login authentication. Cisco Bug IDs: CSCvi25380. Vendors have confirmed this vulnerability Bug ID CSCvi25380 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco IOSXESoftware is a set of operating systems developed by Cisco for its network devices. A buffer overflow vulnerability exists in the Authentication, Authorization, and Recording (AAA) security service in Cisco IOSXESoftwareFuji16.7.1 and Fuji16.8.1. This vulnerability stems from a program failing to perform memory operations correctly

Trust: 2.61

sources: NVD: CVE-2018-0315 // JVNDB: JVNDB-2018-006127 // CNVD: CNVD-2018-11323 // BID: 104410 // VULHUB: VHN-118517 // VULMON: CVE-2018-0315

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-11323

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:16.8.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:16.7.1

Trust: 1.0

vendor:ciscomodel:ios xescope:eqversion:fuji 16.7.1

Trust: 0.8

vendor:ciscomodel:ios xescope:eqversion:fuji 16.8.1

Trust: 0.8

vendor:ciscomodel:ios xe software fuji-16.8.1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe software fuji-16.7.1scope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:fuji-16.8.1

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:fuji-16.8.1a

Trust: 0.6

vendor:ciscomodel:ios xescope:eqversion:fuji-16.7.1

Trust: 0.6

vendor:ciscomodel:ios xe software fujiscope:eqversion:16.8.1

Trust: 0.3

vendor:ciscomodel:ios xe software fujiscope:eqversion:16.7.1

Trust: 0.3

vendor:ciscomodel:ios xe software fujiscope:neversion:16.7.2

Trust: 0.3

vendor:ciscomodel:ios xe software fuji 16.8.1sscope:neversion: -

Trust: 0.3

vendor:ciscomodel:ios xe software fuji 16.8.1cscope:neversion: -

Trust: 0.3

sources: CNVD: CNVD-2018-11323 // BID: 104410 // JVNDB: JVNDB-2018-006127 // CNNVD: CNNVD-201806-400 // NVD: CVE-2018-0315

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0315
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-0315
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-11323
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201806-400
value: CRITICAL

Trust: 0.6

VULHUB: VHN-118517
value: HIGH

Trust: 0.1

VULMON: CVE-2018-0315
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0315
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.1

NVD: CVE-2018-0315
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

CNVD: CNVD-2018-11323
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118517
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0315
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2018-0315
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: CNVD: CNVD-2018-11323 // VULHUB: VHN-118517 // VULMON: CVE-2018-0315 // JVNDB: JVNDB-2018-006127 // CNNVD: CNNVD-201806-400 // NVD: CVE-2018-0315

PROBLEMTYPE DATA

problemtype:CWE-119

Trust: 1.9

sources: VULHUB: VHN-118517 // JVNDB: JVNDB-2018-006127 // NVD: CVE-2018-0315

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201806-400

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201806-400

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-006127

PATCH

title:cisco-sa-20180606-aaaurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180606-aaa

Trust: 0.8

title:Patch for Cisco IOSXESoftware Buffer Overflow Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/131747

Trust: 0.6

title:Cisco IOS XE Software Buffer error vulnerability fixurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=80747

Trust: 0.6

title:Cisco: Cisco IOS XE Software Authentication, Authorization, and Accounting Login Authentication Remote Code Execution Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180606-aaa

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2018-0315

Trust: 0.1

sources: CNVD: CNVD-2018-11323 // VULMON: CVE-2018-0315 // JVNDB: JVNDB-2018-006127 // CNNVD: CNNVD-201806-400

EXTERNAL IDS

db:NVDid:CVE-2018-0315

Trust: 3.5

db:BIDid:104410

Trust: 2.7

db:SECTRACKid:1041086

Trust: 1.8

db:JVNDBid:JVNDB-2018-006127

Trust: 0.8

db:CNNVDid:CNNVD-201806-400

Trust: 0.7

db:CNVDid:CNVD-2018-11323

Trust: 0.6

db:VULHUBid:VHN-118517

Trust: 0.1

db:VULMONid:CVE-2018-0315

Trust: 0.1

sources: CNVD: CNVD-2018-11323 // VULHUB: VHN-118517 // VULMON: CVE-2018-0315 // BID: 104410 // JVNDB: JVNDB-2018-006127 // CNNVD: CNNVD-201806-400 // NVD: CVE-2018-0315

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180606-aaa

Trust: 2.8

url:http://www.securityfocus.com/bid/104410

Trust: 1.8

url:http://www.securitytracker.com/id/1041086

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0315

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0315

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/119.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2018-0315

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-11323 // VULHUB: VHN-118517 // VULMON: CVE-2018-0315 // BID: 104410 // JVNDB: JVNDB-2018-006127 // CNNVD: CNNVD-201806-400 // NVD: CVE-2018-0315

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 104410

SOURCES

db:CNVDid:CNVD-2018-11323
db:VULHUBid:VHN-118517
db:VULMONid:CVE-2018-0315
db:BIDid:104410
db:JVNDBid:JVNDB-2018-006127
db:CNNVDid:CNNVD-201806-400
db:NVDid:CVE-2018-0315

LAST UPDATE DATE

2024-11-23T22:17:27.802000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11323date:2018-06-12T00:00:00
db:VULHUBid:VHN-118517date:2023-01-24T00:00:00
db:VULMONid:CVE-2018-0315date:2023-01-24T00:00:00
db:BIDid:104410date:2018-06-06T00:00:00
db:JVNDBid:JVNDB-2018-006127date:2018-08-07T00:00:00
db:CNNVDid:CNNVD-201806-400date:2022-06-06T00:00:00
db:NVDid:CVE-2018-0315date:2024-11-21T03:37:57.733

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-11323date:2018-06-12T00:00:00
db:VULHUBid:VHN-118517date:2018-06-07T00:00:00
db:VULMONid:CVE-2018-0315date:2018-06-07T00:00:00
db:BIDid:104410date:2018-06-06T00:00:00
db:JVNDBid:JVNDB-2018-006127date:2018-08-07T00:00:00
db:CNNVDid:CNNVD-201806-400date:2018-06-08T00:00:00
db:NVDid:CVE-2018-0315date:2018-06-07T12:29:00.433