ID

VAR-201806-1033


CVE

CVE-2018-0304


TITLE

Cisco FXOS and NX-OS Software buffer error vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-006596

DESCRIPTION

A vulnerability in the Cisco Fabric Services component of Cisco FXOS Software and Cisco NX-OS Software could allow an unauthenticated, remote attacker to read sensitive memory content, create a denial of service (DoS) condition, or execute arbitrary code as root. The vulnerability exists because the affected software insufficiently validates Cisco Fabric Services packet headers. An attacker could exploit this vulnerability by sending a crafted Cisco Fabric Services packet to an affected device. A successful exploit could allow the attacker to cause a buffer overflow or buffer overread condition in the Cisco Fabric Services component, which could allow the attacker to read sensitive memory content, create a DoS condition, or execute arbitrary code as root. This vulnerability affects the following if configured to use Cisco Fabric Services: Firepower 4100 Series Next-Generation Firewalls, Firepower 9300 Security Appliance, MDS 9000 Series Multilayer Switches, Nexus 2000 Series Fabric Extenders, Nexus 3000 Series Switches, Nexus 3500 Platform Switches, Nexus 5500 Platform Switches, Nexus 5600 Platform Switches, Nexus 6000 Series Switches, Nexus 7000 Series Switches, Nexus 7700 Series Switches, Nexus 9000 Series Switches in standalone NX-OS mode, Nexus 9500 R-Series Line Cards and Fabric Modules, UCS 6100 Series Fabric Interconnects, UCS 6200 Series Fabric Interconnects, UCS 6300 Series Fabric Interconnects. Cisco Bug IDs: CSCvd69951, CSCve02459, CSCve02461, CSCve02463, CSCve02474, CSCve04859. Cisco FXOS and NX-OS The software contains a buffer error vulnerability. Vendors have confirmed this vulnerability Bug ID CSCvd69951 , CSCve02459 , CSCve02461 , CSCve02463 , CSCve02474 ,and CSCve04859 It is released as.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco Firepower 4100 Series Next-Generation Firewalls and so on are all products of Cisco. The Cisco Firepower 4100 Series Next-Generation Firewall is a 4100 series firewall device. MDS9000SeriesMultilayerSwitches is a switch device. FXOSSoftware is a suite of firewall software running on Cisco security appliances. NX-OSSoftware is a suite of data center-level operating system software running on Cisco switch devices. FabricServices is one of the Fabric service components. Failed exploit attempts will likely result in a denial-of-service condition

Trust: 2.61

sources: NVD: CVE-2018-0304 // JVNDB: JVNDB-2018-006596 // CNVD: CNVD-2018-11965 // BID: 104513 // VULHUB: VHN-118506 // VULMON: CVE-2018-0304

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-11965

AFFECTED PRODUCTS

vendor:ciscomodel:nexus 5000scope:eqversion:7.0\(0\)hsk\(0.357\)

Trust: 1.6

vendor:ciscomodel:nexus 5000scope:eqversion:8.1\(0.2\)s0

Trust: 1.6

vendor:ciscomodel:firepower 9000scope:eqversion:r211

Trust: 1.6

vendor:ciscomodel:nexus 9000scope:eqversion:8.1\(1\)s4

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:3.1\(3a\)a

Trust: 1.6

vendor:ciscomodel:nexus 5000scope:eqversion:7.3\(0\)d1\(0.98\)

Trust: 1.6

vendor:ciscomodel:nexus 7000scope:eqversion:8.1\(0.112\)s0

Trust: 1.6

vendor:ciscomodel:unified computing systemscope:eqversion:7.0\(0\)hsk\(0.357\)

Trust: 1.6

vendor:ciscomodel:firepower 9000scope:eqversion:r231

Trust: 1.6

vendor:ciscomodel:nexus 9000scope:eqversion:8.1\(0\)bd\(0.20\)

Trust: 1.6

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:2000

Trust: 1.2

vendor:ciscomodel:nexus 7000scope:eqversion:7.3\(2\)d1\(0.49\)

Trust: 1.0

vendor:ciscomodel:nexus 7000scope:eqversion:8.0\(1\)

Trust: 1.0

vendor:ciscomodel:mds series multilayer switchesscope:eqversion:90000

Trust: 0.9

vendor:ciscomodel:nexus 5000scope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 7000scope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus 9000scope: - version: -

Trust: 0.8

vendor:ciscomodel:unified computing systemscope: - version: -

Trust: 0.8

vendor:ciscomodel:firepower 9000scope: - version: -

Trust: 0.8

vendor:ciscomodel:nexus series switchesscope:eqversion:7000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:6000

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:7700

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5600

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:5500

Trust: 0.6

vendor:ciscomodel:nexus platform switchesscope:eqversion:3500

Trust: 0.6

vendor:ciscomodel:firepower security appliancescope:eqversion:9300

Trust: 0.6

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:9500

Trust: 0.6

vendor:ciscomodel:nexus series switchesscope:eqversion:9000

Trust: 0.6

vendor:ciscomodel:fabric services firepower series next-generation firewallsscope:eqversion:4100

Trust: 0.6

vendor:ciscomodel:ucs series fabric interconnectsscope:eqversion:6100

Trust: 0.6

vendor:ciscomodel:ucs series fabric interconnectsscope:eqversion:6200

Trust: 0.6

vendor:ciscomodel:ucs series fabric interconnectsscope:eqversion:6300

Trust: 0.6

vendor:ciscomodel:nx-os 7.0 i7scope:neversion: -

Trust: 0.6

vendor:ciscomodel:ucs series fabric interconnectsscope:eqversion:63000

Trust: 0.3

vendor:ciscomodel:ucs series fabric interconnectsscope:eqversion:62000

Trust: 0.3

vendor:ciscomodel:ucs series fabric interconnectsscope:eqversion:61000

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:8.1

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:8.0

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.3

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.2

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.1

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i7scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i6scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i5scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i4scope: - version: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:7.0

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:6.0

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:5.2

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:3.2

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:3.1

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:3.0

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:2.5

Trust: 0.3

vendor:ciscomodel:nx-osscope:eqversion:2.2

Trust: 0.3

vendor:ciscomodel:nexus r-series line cards and fabric modulesscope:eqversion:95000

Trust: 0.3

vendor:ciscomodel:nexus series switches in standalone nx-os modescope:eqversion:90000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:77000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:70000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:60000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:56000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:55000

Trust: 0.3

vendor:ciscomodel:nexus platform switchesscope:eqversion:35000

Trust: 0.3

vendor:ciscomodel:nexus series switchesscope:eqversion:30000

Trust: 0.3

vendor:ciscomodel:nexus series fabric extendersscope:eqversion:20000

Trust: 0.3

vendor:ciscomodel:fxosscope:eqversion:2.2.2

Trust: 0.3

vendor:ciscomodel:fxosscope:eqversion:2.2.1

Trust: 0.3

vendor:ciscomodel:fxosscope:eqversion:2.1.1

Trust: 0.3

vendor:ciscomodel:fxosscope:eqversion:2.0

Trust: 0.3

vendor:ciscomodel:fxosscope:eqversion:1.1

Trust: 0.3

vendor:ciscomodel:firepower security appliancescope:eqversion:93000

Trust: 0.3

vendor:ciscomodel:firepower series next-generation firewallscope:eqversion:41000

Trust: 0.3

vendor:ciscomodel:nx-osscope:neversion:8.1(2)

Trust: 0.3

vendor:ciscomodel:nx-os 8.1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.3 n1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.3 d1scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 i4scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-os 7.0 f3scope:neversion: -

Trust: 0.3

vendor:ciscomodel:nx-osscope:neversion:6.2(21)

Trust: 0.3

vendor:ciscomodel:nx-osscope:neversion:6.2(20)

Trust: 0.3

vendor:ciscomodel:nx-os 3.2scope:neversion: -

Trust: 0.3

vendor:ciscomodel:fxosscope:neversion:2.2.2.17

Trust: 0.3

vendor:ciscomodel:fxosscope:neversion:2.2.1.70

Trust: 0.3

vendor:ciscomodel:fxosscope:neversion:2.1.1.86

Trust: 0.3

vendor:ciscomodel:fxosscope:neversion:2.0.1.153

Trust: 0.3

vendor:ciscomodel:fxosscope:neversion:1.1.4.179

Trust: 0.3

sources: CNVD: CNVD-2018-11965 // BID: 104513 // JVNDB: JVNDB-2018-006596 // CNNVD: CNNVD-201806-1050 // NVD: CVE-2018-0304

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0304
value: CRITICAL

Trust: 1.0

NVD: CVE-2018-0304
value: CRITICAL

Trust: 0.8

CNVD: CNVD-2018-11965
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201806-1050
value: CRITICAL

Trust: 0.6

VULHUB: VHN-118506
value: HIGH

Trust: 0.1

VULMON: CVE-2018-0304
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0304
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-11965
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118506
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0304
baseSeverity: CRITICAL
baseScore: 9.8
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 5.9
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-11965 // VULHUB: VHN-118506 // VULMON: CVE-2018-0304 // JVNDB: JVNDB-2018-006596 // CNNVD: CNNVD-201806-1050 // NVD: CVE-2018-0304

PROBLEMTYPE DATA

problemtype:CWE-125

Trust: 1.1

problemtype:CWE-20

Trust: 1.0

problemtype:CWE-119

Trust: 0.9

sources: VULHUB: VHN-118506 // JVNDB: JVNDB-2018-006596 // NVD: CVE-2018-0304

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201806-1050

TYPE

buffer error

Trust: 0.6

sources: CNNVD: CNNVD-201806-1050

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-006596

PATCH

title:cisco-sa-20180620-fxnxos-aceurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180620-fxnxos-ace

Trust: 0.8

title:Patch for CiscoFXOS and NX-OSCFS Arbitrary Code Execution Vulnerability (CNVD-2018-11965)url:https://www.cnvd.org.cn/patchInfo/show/132605

Trust: 0.6

title:Multiple Cisco product FXOS Software and NX-OS Software Fabric Services Fixes for component input validation vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=81115

Trust: 0.6

title:Cisco: Cisco FXOS and NX-OS Software Cisco Fabric Services Arbitrary Code Execution Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180620-fxnxos-ace

Trust: 0.1

sources: CNVD: CNVD-2018-11965 // VULMON: CVE-2018-0304 // JVNDB: JVNDB-2018-006596 // CNNVD: CNNVD-201806-1050

EXTERNAL IDS

db:NVDid:CVE-2018-0304

Trust: 3.5

db:BIDid:104513

Trust: 2.7

db:SECTRACKid:1041169

Trust: 1.8

db:JVNDBid:JVNDB-2018-006596

Trust: 0.8

db:CNVDid:CNVD-2018-11965

Trust: 0.6

db:CNNVDid:CNNVD-201806-1050

Trust: 0.6

db:VULHUBid:VHN-118506

Trust: 0.1

db:VULMONid:CVE-2018-0304

Trust: 0.1

sources: CNVD: CNVD-2018-11965 // VULHUB: VHN-118506 // VULMON: CVE-2018-0304 // BID: 104513 // JVNDB: JVNDB-2018-006596 // CNNVD: CNNVD-201806-1050 // NVD: CVE-2018-0304

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180620-fxnxos-ace

Trust: 2.8

url:http://www.securityfocus.com/bid/104513

Trust: 1.9

url:http://www.securitytracker.com/id/1041169

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0304

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0304

Trust: 0.8

url:http://www.cisco.com

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/125.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: CNVD: CNVD-2018-11965 // VULHUB: VHN-118506 // VULMON: CVE-2018-0304 // BID: 104513 // JVNDB: JVNDB-2018-006596 // CNNVD: CNNVD-201806-1050 // NVD: CVE-2018-0304

CREDITS

Cisco

Trust: 0.3

sources: BID: 104513

SOURCES

db:CNVDid:CNVD-2018-11965
db:VULHUBid:VHN-118506
db:VULMONid:CVE-2018-0304
db:BIDid:104513
db:JVNDBid:JVNDB-2018-006596
db:CNNVDid:CNNVD-201806-1050
db:NVDid:CVE-2018-0304

LAST UPDATE DATE

2024-11-23T21:38:49.292000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-11965date:2018-06-23T00:00:00
db:VULHUBid:VHN-118506date:2019-10-09T00:00:00
db:VULMONid:CVE-2018-0304date:2019-10-09T00:00:00
db:BIDid:104513date:2018-06-20T00:00:00
db:JVNDBid:JVNDB-2018-006596date:2018-08-28T00:00:00
db:CNNVDid:CNNVD-201806-1050date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0304date:2024-11-21T03:37:56.273

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-11965date:2018-06-23T00:00:00
db:VULHUBid:VHN-118506date:2018-06-20T00:00:00
db:VULMONid:CVE-2018-0304date:2018-06-20T00:00:00
db:BIDid:104513date:2018-06-20T00:00:00
db:JVNDBid:JVNDB-2018-006596date:2018-08-28T00:00:00
db:CNNVDid:CNNVD-201806-1050date:2018-06-21T00:00:00
db:NVDid:CVE-2018-0304date:2018-06-20T21:29:00.530