ID

VAR-201810-0340


CVE

CVE-2018-0467


TITLE

Cisco IOS XE Software input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-010842

DESCRIPTION

A vulnerability in the IPv6 processing code of Cisco IOS and IOS XE Software could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to incorrect handling of specific IPv6 hop-by-hop options. An attacker could exploit this vulnerability by sending a malicious IPv6 packet to or through the affected device. A successful exploit could allow the attacker to cause the device to reload, resulting in a denial of service (DoS) condition on an affected device. Cisco IOS XE The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco IOS Software and IOSXE Software are operating systems developed by Cisco for its network devices

Trust: 2.61

sources: NVD: CVE-2018-0467 // JVNDB: JVNDB-2018-010842 // CNVD: CNVD-2018-20261 // BID: 107779 // VULHUB: VHN-118669 // VULMON: CVE-2018-0467

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-20261

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:16.6.1

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:15.6\(2\)sp

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:everest-16.6.1

Trust: 1.6

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:ios softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:asr series route processorscope:eqversion:10000

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley stratixscope:eqversion:83000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 e0ascope:eqversion:8000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ea.fc4scope:eqversion:8000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 e0ascope:eqversion:5700

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ea.fc4scope:eqversion:5700

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 e0ascope:eqversion:5410

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ea.fc4scope:eqversion:5410

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ea3scope:eqversion:5410

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ebscope:eqversion:5410

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 e0ascope:eqversion:5400

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ea.fc4scope:eqversion:5400

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ea3scope:eqversion:5400

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ea2scope:eqversion:5400

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ea1scope:eqversion:5400

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley armorstratix 15.2 e0ascope:eqversion:5700

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley armorstratix 15.2 ea.fc4scope:eqversion:5700

Trust: 0.3

vendor:rockwallmodel:automation allen-bradley stratix 15.2 ea3scope:eqversion:8000

Trust: 0.3

vendor:rockwallmodel:automation allen-bradley stratix 15.2 ea3scope:eqversion:5700

Trust: 0.3

vendor:rockwallmodel:automation allen-bradley armorstratix 15.2 ea3scope:eqversion:5700

Trust: 0.3

vendor:ciscomodel:ncsscope:eqversion:42160

Trust: 0.3

vendor:ciscomodel:ncsscope:eqversion:42060

Trust: 0.3

vendor:ciscomodel:ncsscope:eqversion:42020

Trust: 0.3

vendor:ciscomodel:ncsscope:eqversion:42010

Trust: 0.3

vendor:ciscomodel:me 3800x-24fs-m switch routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:me 3600x-24ts-m switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:me 3600x-24fs-m switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:me 3600x-24cx-m switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:cloud services routerscope:eqversion:1000v0

Trust: 0.3

vendor:ciscomodel:catalyst c3850-12x48u-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst c3850-12x48u-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst c3850-12x48u-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48xs-f-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48xs-f-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48xs-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48u-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48u-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48u-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48t-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48t-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48t-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48p-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48p-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48p-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48f-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48f-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-48f-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-32xs-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-32xs-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24xu-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24xu-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24xu-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24xs-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24xs-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24u-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24u-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24u-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24t-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24t-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24t-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24s-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24s-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24p-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24p-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-24p-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-16xs-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-16xs-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-12xs-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-12xs-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-12s-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3850-12s-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-8x24uq-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-8x24uq-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-8x24uq-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-8x24pd-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-8x24pd-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-8x24pd-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48ts-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48ts-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48ts-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48tq-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48tq-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48tq-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48td-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48td-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48td-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48ps-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48ps-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48ps-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48pq-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48pq-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48pq-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48pd-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48pd-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48pd-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fs-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fs-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fs-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fqm-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fqm-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fqm-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fq-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fq-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fq-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fd-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fd-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-48fd-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24ts-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24ts-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24ts-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24td-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24td-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24td-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24ps-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24ps-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24ps-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24pdm-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24pdm-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24pdm-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24pd-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24pd-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-24pd-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48uz-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48uz-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48uz-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48ur-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48ur-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48ur-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48uq-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48uq-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48uq-e switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48fd-s switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 3650-12x48fd-l switchscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 920-4sz-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 920-4sz-a routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 920-24tz-m routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 920-24sz-m routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 920-24sz-im routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 920-12sz-im routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 920-12cz-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 920-12cz-a routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 920-10sz-pd routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:9030

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:9020

Trust: 0.3

vendor:ciscomodel:asr 901s-4sg-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901s-3sg-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901s-3sg-f-ah routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901s-2sg-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901s-2sg-f-ah routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-ft-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-ft-a routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-fs-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-fs-a routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-6cz-f-a routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-4c-ft-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-4c-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-12c-ft-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr 901-12c-f-d routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr route switch processorscope:eqversion:90030

Trust: 0.3

vendor:ciscomodel:asr route switch processorscope:eqversion:90020

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1002-x0

Trust: 0.3

vendor:ciscomodel:asr 1002-hx routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:asr routerscope:eqversion:1001-x0

Trust: 0.3

vendor:ciscomodel:asr 1001-hx routerscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:integrated services routerscope:eqversion:4451-x0

Trust: 0.3

vendor:ciscomodel:integrated services routerscope:eqversion:44510

Trust: 0.3

vendor:ciscomodel:integrated services routerscope:eqversion:44310

Trust: 0.3

vendor:ciscomodel:integrated services routerscope:eqversion:43510

Trust: 0.3

vendor:ciscomodel:integrated services routerscope:eqversion:43310

Trust: 0.3

vendor:ciscomodel:integrated services routerscope:eqversion:43210

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 ea7scope:neversion:8300

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 e2ascope:neversion:8000

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 e2ascope:neversion:5700

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 e2ascope:neversion:5410

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 15.2 e2ascope:neversion:5400

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley armorstratix 15.2 e2ascope:neversion:5700

Trust: 0.3

sources: CNVD: CNVD-2018-20261 // BID: 107779 // JVNDB: JVNDB-2018-010842 // CNNVD: CNNVD-201809-1256 // NVD: CVE-2018-0467

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0467
value: HIGH

Trust: 1.0

NVD: CVE-2018-0467
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-20261
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201809-1256
value: HIGH

Trust: 0.6

VULHUB: VHN-118669
value: HIGH

Trust: 0.1

VULMON: CVE-2018-0467
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0467
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

CNVD: CNVD-2018-20261
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118669
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0467
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-20261 // VULHUB: VHN-118669 // VULMON: CVE-2018-0467 // JVNDB: JVNDB-2018-010842 // CNNVD: CNNVD-201809-1256 // NVD: CVE-2018-0467

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-118669 // JVNDB: JVNDB-2018-010842 // NVD: CVE-2018-0467

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201809-1256

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 107779 // CNNVD: CNNVD-201809-1256

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-010842

PATCH

title:cisco-sa-20180926-ipv6hbhurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ipv6hbh

Trust: 0.8

title:Patch for CiscoIOS and IOSXESoftwareIPv6Hop-by-HopOptions Denial of Service Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/141465

Trust: 0.6

title:Cisco IOS Software and IOS XE Software Enter the fix for the verification vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85265

Trust: 0.6

title:Cisco: Cisco IOS and IOS XE Software IPv6 Hop-by-Hop Options Denial of Service Vulnerabilityurl:https://vulmon.com/vendoradvisory?qidtp=cisco_security_advisories_and_alerts_ciscoproducts&qid=cisco-sa-20180926-ipv6hbh

Trust: 0.1

sources: CNVD: CNVD-2018-20261 // VULMON: CVE-2018-0467 // JVNDB: JVNDB-2018-010842 // CNNVD: CNNVD-201809-1256

EXTERNAL IDS

db:NVDid:CVE-2018-0467

Trust: 3.5

db:ICS CERTid:ICSA-19-094-03

Trust: 2.9

db:SECTRACKid:1041737

Trust: 1.8

db:JVNDBid:JVNDB-2018-010842

Trust: 0.8

db:CNNVDid:CNNVD-201809-1256

Trust: 0.7

db:CNVDid:CNVD-2018-20261

Trust: 0.6

db:ICS CERTid:ICSA-19-094-02

Trust: 0.6

db:AUSCERTid:ESB-2019.1153

Trust: 0.6

db:BIDid:107779

Trust: 0.3

db:VULHUBid:VHN-118669

Trust: 0.1

db:VULMONid:CVE-2018-0467

Trust: 0.1

sources: CNVD: CNVD-2018-20261 // VULHUB: VHN-118669 // VULMON: CVE-2018-0467 // BID: 107779 // JVNDB: JVNDB-2018-010842 // CNNVD: CNNVD-201809-1256 // NVD: CVE-2018-0467

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-19-094-03

Trust: 3.6

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-ipv6hbh

Trust: 2.7

url:http://www.securitytracker.com/id/1041737

Trust: 1.8

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0467

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0467

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-19-094-02

Trust: 0.6

url:https://www.auscert.org.au/bulletins/78478

Trust: 0.6

url:http://www.cisco.com/

Trust: 0.3

url:https://cwe.mitre.org/data/definitions/20.html

Trust: 0.1

url:https://www.rapid7.com/db/vulnerabilities/cisco-ios-cve-2018-0467

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/150461

Trust: 0.1

sources: CNVD: CNVD-2018-20261 // VULHUB: VHN-118669 // VULMON: CVE-2018-0467 // BID: 107779 // JVNDB: JVNDB-2018-010842 // CNNVD: CNNVD-201809-1256 // NVD: CVE-2018-0467

CREDITS

Rockwell Automation reported these vulnerabilities to NCCIC.

Trust: 0.6

sources: CNNVD: CNNVD-201809-1256

SOURCES

db:CNVDid:CNVD-2018-20261
db:VULHUBid:VHN-118669
db:VULMONid:CVE-2018-0467
db:BIDid:107779
db:JVNDBid:JVNDB-2018-010842
db:CNNVDid:CNNVD-201809-1256
db:NVDid:CVE-2018-0467

LAST UPDATE DATE

2024-08-14T13:45:32.811000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-20261date:2018-09-30T00:00:00
db:VULHUBid:VHN-118669date:2019-04-15T00:00:00
db:VULMONid:CVE-2018-0467date:2019-04-15T00:00:00
db:BIDid:107779date:2018-09-26T00:00:00
db:JVNDBid:JVNDB-2018-010842date:2019-04-10T00:00:00
db:CNNVDid:CNNVD-201809-1256date:2019-04-19T00:00:00
db:NVDid:CVE-2018-0467date:2019-04-15T12:31:08.757

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-20261date:2018-09-30T00:00:00
db:VULHUBid:VHN-118669date:2018-10-05T00:00:00
db:VULMONid:CVE-2018-0467date:2018-10-05T00:00:00
db:BIDid:107779date:2018-09-26T00:00:00
db:JVNDBid:JVNDB-2018-010842date:2018-12-25T00:00:00
db:CNNVDid:CNNVD-201809-1256date:2018-09-28T00:00:00
db:NVDid:CVE-2018-0467date:2018-10-05T14:29:04.590