ID

VAR-201810-0349


CVE

CVE-2018-0480


TITLE

Cisco IOS XE software Race condition vulnerability

Trust: 0.8

sources: JVNDB: JVNDB-2018-010834

DESCRIPTION

A vulnerability in the errdisable per VLAN feature of Cisco IOS XE Software could allow an unauthenticated, adjacent attacker to cause the device to crash, leading to a denial of service (DoS) condition. The vulnerability is due to a race condition that occurs when the VLAN and port enter an errdisabled state, resulting in an incorrect state in the software. An attacker could exploit this vulnerability by sending frames that trigger the errdisable condition. A successful exploit could allow the attacker to cause the affected device to crash, leading to a DoS condition. The Cisco Catalyst 3650, 3850, and 4500E Series Switches are all different switches from Cisco. IOSXESoftware is a set of operating systems developed by Cisco for its network devices. A denial of service vulnerability exists in the errdisableperVLAN feature in IOSXESoftware in the Cisco Catalyst 3650, 3850, and 4500E Series Switches. Cisco IOS XE Software is prone to a denial-of-service vulnerability. This issue is being tracked by Cisco Bug ID CSCvh13611

Trust: 2.52

sources: NVD: CVE-2018-0480 // JVNDB: JVNDB-2018-010834 // CNVD: CNVD-2018-20298 // BID: 105400 // VULHUB: VHN-118682

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-20298

AFFECTED PRODUCTS

vendor:ciscomodel:ios xescope:eqversion:3.6\(5\)

Trust: 1.6

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:catalyst series switchesscope:eqversion:3650

Trust: 0.6

vendor:ciscomodel:catalyst series switchesscope:eqversion:3850

Trust: 0.6

vendor:ciscomodel:catalyst 4500e series switchesscope: - version: -

Trust: 0.6

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst 4500e series switchesscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:catalyst series switchesscope:eqversion:38500

Trust: 0.3

vendor:ciscomodel:catalyst series switchesscope:eqversion:36500

Trust: 0.3

sources: CNVD: CNVD-2018-20298 // BID: 105400 // JVNDB: JVNDB-2018-010834 // CNNVD: CNNVD-201809-1237 // NVD: CVE-2018-0480

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0480
value: MEDIUM

Trust: 1.0

NVD: CVE-2018-0480
value: MEDIUM

Trust: 0.8

CNVD: CNVD-2018-20298
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201809-1237
value: MEDIUM

Trust: 0.6

VULHUB: VHN-118682
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2018-0480
severity: MEDIUM
baseScore: 5.7
vectorString: AV:A/AC:M/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-20298
severity: MEDIUM
baseScore: 6.1
vectorString: AV:A/AC:L/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 6.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118682
severity: MEDIUM
baseScore: 5.7
vectorString: AV:A/AC:M/AU:N/C:N/I:N/A:C
accessVector: ADJACENT_NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 5.5
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0480
baseSeverity: MEDIUM
baseScore: 6.1
vectorString: CVSS:3.0/AV:A/AC:H/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: ADJACENT
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 1.6
impactScore: 4.0
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-20298 // VULHUB: VHN-118682 // JVNDB: JVNDB-2018-010834 // CNNVD: CNNVD-201809-1237 // NVD: CVE-2018-0480

PROBLEMTYPE DATA

problemtype:CWE-362

Trust: 1.9

sources: VULHUB: VHN-118682 // JVNDB: JVNDB-2018-010834 // NVD: CVE-2018-0480

THREAT TYPE

remote or local

Trust: 0.6

sources: CNNVD: CNNVD-201809-1237

TYPE

competition condition problem

Trust: 0.6

sources: CNNVD: CNNVD-201809-1237

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-010834

PATCH

title:cisco-sa-20180926-errdisableurl:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-errdisable

Trust: 0.8

title:Patch for Cisco Catalyst 3650, 3850, and 4500ESeriesSwitchsIOSXESoftware Denial of Service Vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/141487

Trust: 0.6

title:Cisco Catalyst 3650 , 3850 and 4500E Series Switchs IOS XE Software Repair measures for competitive conditionsurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85252

Trust: 0.6

sources: CNVD: CNVD-2018-20298 // JVNDB: JVNDB-2018-010834 // CNNVD: CNNVD-201809-1237

EXTERNAL IDS

db:NVDid:CVE-2018-0480

Trust: 3.4

db:BIDid:105400

Trust: 2.6

db:SECTRACKid:1041737

Trust: 1.7

db:JVNDBid:JVNDB-2018-010834

Trust: 0.8

db:CNNVDid:CNNVD-201809-1237

Trust: 0.7

db:CNVDid:CNVD-2018-20298

Trust: 0.6

db:VULHUBid:VHN-118682

Trust: 0.1

sources: CNVD: CNVD-2018-20298 // VULHUB: VHN-118682 // BID: 105400 // JVNDB: JVNDB-2018-010834 // CNNVD: CNNVD-201809-1237 // NVD: CVE-2018-0480

REFERENCES

url:http://www.securityfocus.com/bid/105400

Trust: 2.3

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-errdisable

Trust: 2.0

url:http://www.securitytracker.com/id/1041737

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0480

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0480

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2018-20298 // VULHUB: VHN-118682 // BID: 105400 // JVNDB: JVNDB-2018-010834 // CNNVD: CNNVD-201809-1237 // NVD: CVE-2018-0480

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 105400

SOURCES

db:CNVDid:CNVD-2018-20298
db:VULHUBid:VHN-118682
db:BIDid:105400
db:JVNDBid:JVNDB-2018-010834
db:CNNVDid:CNNVD-201809-1237
db:NVDid:CVE-2018-0480

LAST UPDATE DATE

2024-08-14T13:45:32.501000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-20298date:2018-09-30T00:00:00
db:VULHUBid:VHN-118682date:2019-10-09T00:00:00
db:BIDid:105400date:2018-09-26T00:00:00
db:JVNDBid:JVNDB-2018-010834date:2018-12-25T00:00:00
db:CNNVDid:CNNVD-201809-1237date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0480date:2019-10-09T23:32:10.413

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-20298date:2018-09-30T00:00:00
db:VULHUBid:VHN-118682date:2018-10-05T00:00:00
db:BIDid:105400date:2018-09-26T00:00:00
db:JVNDBid:JVNDB-2018-010834date:2018-12-25T00:00:00
db:CNNVDid:CNNVD-201809-1237date:2018-09-28T00:00:00
db:NVDid:CVE-2018-0480date:2018-10-05T14:29:05.560