ID

VAR-201810-0344


CVE

CVE-2018-0472


TITLE

Cisco IOS XE Software platform and Cisco ASA 5500-X Series Adaptive Security Appliance Input validation vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-011573

DESCRIPTION

A vulnerability in the IPsec driver code of multiple Cisco IOS XE Software platforms and the Cisco ASA 5500-X Series Adaptive Security Appliance (ASA) could allow an unauthenticated, remote attacker to cause the device to reload. The vulnerability is due to improper processing of malformed IPsec Authentication Header (AH) or Encapsulating Security Payload (ESP) packets. An attacker could exploit this vulnerability by sending malformed IPsec packets to be processed by an affected device. An exploit could allow the attacker to cause a reload of the affected device. Cisco IOSXESoftware is the operating system for Cisco network devices, and the CiscoASA5500-XSeriesAdaptiveSecurityApplianceIPsec is a cisco security device. Multiple Cisco Products are prone to a denial-of-service vulnerability. This issue is being tracked by Cisco Bug IDs CSCvf73114, CSCvg37952, CSCvh04189, CSCvh04591, and CSCvi30496. ASA 5500-X Series Adaptive Security Appliance is a 5500-X series security appliance

Trust: 2.52

sources: NVD: CVE-2018-0472 // JVNDB: JVNDB-2018-011573 // CNVD: CNVD-2018-20048 // BID: 105418 // VULHUB: VHN-118674

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-20048

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:15.5\(3\)s5.36

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion:16.8.1

Trust: 1.6

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xe softwarescope: - version: -

Trust: 0.6

vendor:ciscomodel:asa series adaptive security appliance ipsecscope:eqversion:5500-x

Trust: 0.6

vendor:rockwellmodel:automation allen-bradley stratix 1783-sad4t0spk9scope:eqversion:5950

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 1783-sad4t0sbk9scope:eqversion:5950

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 1783-sad2t2spk9scope:eqversion:5950

Trust: 0.3

vendor:rockwellmodel:automation allen-bradley stratix 1783-sad2t2sbk9scope:eqversion:5950

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.2.3

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.2.2

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.2.1

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:eqversion:6.2

Trust: 0.3

vendor:ciscomodel:asr series routersscope:eqversion:10000

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.9

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.8

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.7

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.6

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.5

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.4

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:eqversion:9.3

Trust: 0.3

vendor:ciscomodel:adaptive security appliance seriesscope:eqversion:5500-x0

Trust: 0.3

vendor:ciscomodel:seriesscope:eqversion:40000

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:neversion:6.2.3.1

Trust: 0.3

vendor:ciscomodel:firepower threat defense softwarescope:neversion:6.2.2.3

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:neversion:9.9.2.2

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:neversion:9.8.2.26

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:neversion:9.6.4.8

Trust: 0.3

vendor:ciscomodel:adaptive security appliance softwarescope:neversion:9.4.4.18

Trust: 0.3

sources: CNVD: CNVD-2018-20048 // BID: 105418 // JVNDB: JVNDB-2018-011573 // CNNVD: CNNVD-201809-1251 // NVD: CVE-2018-0472

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0472
value: HIGH

Trust: 1.0

NVD: CVE-2018-0472
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-20048
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201809-1251
value: HIGH

Trust: 0.6

VULHUB: VHN-118674
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0472
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-20048
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118674
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0472
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-20048 // VULHUB: VHN-118674 // JVNDB: JVNDB-2018-011573 // CNNVD: CNNVD-201809-1251 // NVD: CVE-2018-0472

PROBLEMTYPE DATA

problemtype:CWE-20

Trust: 1.9

sources: VULHUB: VHN-118674 // JVNDB: JVNDB-2018-011573 // NVD: CVE-2018-0472

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201809-1251

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 105418 // CNNVD: CNNVD-201809-1251

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-011573

PATCH

title:cisco-sa-20180926-ipsecurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-ipsec

Trust: 0.8

title:Patch for Cisco IOSXESoftware and Cisco ASA 5500-XSeriesAdaptiveSecurityApplianceIPsec Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/141291

Trust: 0.6

title:Cisco IOS XE Software platforms and ASA 5500-X Series Adaptive Security Appliance Enter the fix for the verification vulnerabilityurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85260

Trust: 0.6

sources: CNVD: CNVD-2018-20048 // JVNDB: JVNDB-2018-011573 // CNNVD: CNNVD-201809-1251

EXTERNAL IDS

db:NVDid:CVE-2018-0472

Trust: 3.4

db:ICS CERTid:ICSA-19-094-04

Trust: 2.8

db:BIDid:105418

Trust: 2.0

db:SECTRACKid:1041737

Trust: 1.7

db:SECTRACKid:1041735

Trust: 1.7

db:JVNDBid:JVNDB-2018-011573

Trust: 0.8

db:CNNVDid:CNNVD-201809-1251

Trust: 0.7

db:CNVDid:CNVD-2018-20048

Trust: 0.6

db:ICS CERTid:ICSA-19-094-02

Trust: 0.6

db:NSFOCUSid:43556

Trust: 0.6

db:AUSCERTid:ESB-2019.1153

Trust: 0.6

db:VULHUBid:VHN-118674

Trust: 0.1

sources: CNVD: CNVD-2018-20048 // VULHUB: VHN-118674 // BID: 105418 // JVNDB: JVNDB-2018-011573 // CNNVD: CNNVD-201809-1251 // NVD: CVE-2018-0472

REFERENCES

url:https://ics-cert.us-cert.gov/advisories/icsa-19-094-04

Trust: 3.4

url:http://www.securityfocus.com/bid/105418

Trust: 2.9

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-ipsec

Trust: 2.6

url:http://www.securitytracker.com/id/1041735

Trust: 1.7

url:http://www.securitytracker.com/id/1041737

Trust: 1.7

url:http://www.cisco.com/

Trust: 0.9

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0472

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0472

Trust: 0.8

url:https://ics-cert.us-cert.gov/advisories/icsa-19-094-02

Trust: 0.6

url:https://www.auscert.org.au/bulletins/78478

Trust: 0.6

url:http://www.nsfocus.net/vulndb/43556

Trust: 0.6

sources: CNVD: CNVD-2018-20048 // VULHUB: VHN-118674 // BID: 105418 // JVNDB: JVNDB-2018-011573 // CNNVD: CNNVD-201809-1251 // NVD: CVE-2018-0472

CREDITS

The vendor reported this issue.,Rockwell Automation reported this vulnerability to NCCIC.

Trust: 0.6

sources: CNNVD: CNNVD-201809-1251

SOURCES

db:CNVDid:CNVD-2018-20048
db:VULHUBid:VHN-118674
db:BIDid:105418
db:JVNDBid:JVNDB-2018-011573
db:CNNVDid:CNNVD-201809-1251
db:NVDid:CVE-2018-0472

LAST UPDATE DATE

2024-08-14T13:45:32.931000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-20048date:2018-09-28T00:00:00
db:VULHUBid:VHN-118674date:2019-04-15T00:00:00
db:BIDid:105418date:2019-04-05T06:00:00
db:JVNDBid:JVNDB-2018-011573date:2019-04-10T00:00:00
db:CNNVDid:CNNVD-201809-1251date:2019-07-02T00:00:00
db:NVDid:CVE-2018-0472date:2019-04-15T12:31:09.023

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-20048date:2018-09-28T00:00:00
db:VULHUBid:VHN-118674date:2018-10-05T00:00:00
db:BIDid:105418date:2018-09-26T00:00:00
db:JVNDBid:JVNDB-2018-011573date:2019-01-17T00:00:00
db:CNNVDid:CNNVD-201809-1251date:2018-09-28T00:00:00
db:NVDid:CVE-2018-0472date:2018-10-05T14:29:05.013