ID

VAR-201810-0351


CVE

CVE-2018-0485


TITLE

SM-1T3/E3 Data processing vulnerability in firmware

Trust: 0.8

sources: JVNDB: JVNDB-2018-013491

DESCRIPTION

A vulnerability in the SM-1T3/E3 firmware on Cisco Second Generation Integrated Services Routers (ISR G2) and the Cisco 4451-X Integrated Services Router (ISR4451-X) could allow an unauthenticated, remote attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a denial of service (DoS) condition on an affected device. The vulnerability is due to improper handling of user input. An attacker could exploit this vulnerability by first connecting to the SM-1T3/E3 module console and entering a string sequence. A successful exploit could allow the attacker to cause the ISR G2 Router or the SM-1T3/E3 module on the ISR4451-X to reload, resulting in a DoS condition on an affected device. SM-1T3/E3 Firmware contains a data processing vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. CiscoSecondGenerationIntegratedServicesRouters(ISRG2) and 4451-XIntegratedServicesRouter (ISR4451-X) are router products of Cisco Systems of the United States. A denial of service vulnerability exists in the IOS and IOSXESoftware SM-1T3/E3 firmware on Cisco ISRG2 and ISR4451-X. Attackers can exploit this issue to reload the affected device, denying service to legitimate users This issue is being tracked by Cisco Bug IDs CSCva23932, and CSCvi95007

Trust: 2.52

sources: NVD: CVE-2018-0485 // JVNDB: JVNDB-2018-013491 // CNVD: CNVD-2018-20258 // BID: 105433 // VULHUB: VHN-118687

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2018-20258

AFFECTED PRODUCTS

vendor:ciscomodel:iosscope:eqversion:15.6\(3\)m

Trust: 1.6

vendor:ciscomodel:ios xescope:eqversion: -

Trust: 1.6

vendor:ciscomodel:iosscope: - version: -

Trust: 0.8

vendor:ciscomodel:ios xescope: - version: -

Trust: 0.8

vendor:ciscomodel:isr g2 routersscope: - version: -

Trust: 0.6

vendor:ciscomodel:isr4451-xscope: - version: -

Trust: 0.6

vendor:ciscomodel:isr4451-x routersscope:eqversion:0

Trust: 0.3

vendor:ciscomodel:isr g2scope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios xe softwarescope:eqversion:0

Trust: 0.3

vendor:ciscomodel:ios 15.6 mscope: - version: -

Trust: 0.3

vendor:ciscomodel:iosscope:eqversion:0

Trust: 0.3

sources: CNVD: CNVD-2018-20258 // BID: 105433 // JVNDB: JVNDB-2018-013491 // CNNVD: CNNVD-201809-1253 // NVD: CVE-2018-0485

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2018-0485
value: HIGH

Trust: 1.0

NVD: CVE-2018-0485
value: HIGH

Trust: 0.8

CNVD: CNVD-2018-20258
value: HIGH

Trust: 0.6

CNNVD: CNNVD-201809-1253
value: HIGH

Trust: 0.6

VULHUB: VHN-118687
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2018-0485
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2018-20258
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-118687
severity: HIGH
baseScore: 7.8
vectorString: AV:N/AC:L/AU:N/C:N/I:N/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 6.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2018-0485
baseSeverity: HIGH
baseScore: 8.6
vectorString: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:N/I:N/A:H
attackVector: NETWORK
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: NONE
scope: CHANGED
confidentialityImpact: NONE
integrityImpact: NONE
availabilityImpact: HIGH
exploitabilityScore: 3.9
impactScore: 4.0
version: 3.0

Trust: 1.8

sources: CNVD: CNVD-2018-20258 // VULHUB: VHN-118687 // JVNDB: JVNDB-2018-013491 // CNNVD: CNNVD-201809-1253 // NVD: CVE-2018-0485

PROBLEMTYPE DATA

problemtype:CWE-19

Trust: 1.8

problemtype:CWE-20

Trust: 1.1

sources: VULHUB: VHN-118687 // JVNDB: JVNDB-2018-013491 // NVD: CVE-2018-0485

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201809-1253

TYPE

Input Validation Error

Trust: 0.9

sources: BID: 105433 // CNNVD: CNNVD-201809-1253

CONFIGURATIONS

sources: JVNDB: JVNDB-2018-013491

PATCH

title:cisco-sa-20180926-sm1t3e3url:https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20180926-sm1t3e3

Trust: 0.8

title:Patch for CiscoSecondGenerationIntegratedServicesRouters and 4451-XIntegratedServicesRouter Denial of Service Vulnerabilityurl:https://www.cnvd.org.cn/patchInfo/show/141453

Trust: 0.6

title:Cisco Second Generation Integrated Services Routers and 4451-X Integrated Services Router Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=85262

Trust: 0.6

sources: CNVD: CNVD-2018-20258 // JVNDB: JVNDB-2018-013491 // CNNVD: CNNVD-201809-1253

EXTERNAL IDS

db:NVDid:CVE-2018-0485

Trust: 3.1

db:BIDid:105433

Trust: 2.0

db:SECTRACKid:1041737

Trust: 1.7

db:SECTRACKid:1041736

Trust: 1.7

db:JVNDBid:JVNDB-2018-013491

Trust: 0.8

db:CNNVDid:CNNVD-201809-1253

Trust: 0.7

db:CNVDid:CNVD-2018-20258

Trust: 0.6

db:VULHUBid:VHN-118687

Trust: 0.1

sources: CNVD: CNVD-2018-20258 // VULHUB: VHN-118687 // BID: 105433 // JVNDB: JVNDB-2018-013491 // CNNVD: CNNVD-201809-1253 // NVD: CVE-2018-0485

REFERENCES

url:https://tools.cisco.com/security/center/content/ciscosecurityadvisory/cisco-sa-20180926-sm1t3e3

Trust: 2.6

url:http://www.securityfocus.com/bid/105433

Trust: 1.7

url:http://www.securitytracker.com/id/1041736

Trust: 1.7

url:http://www.securitytracker.com/id/1041737

Trust: 1.7

url:https://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2018-0485

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2018-0485

Trust: 0.8

url:http://www.cisco.com/

Trust: 0.3

sources: CNVD: CNVD-2018-20258 // VULHUB: VHN-118687 // BID: 105433 // JVNDB: JVNDB-2018-013491 // CNNVD: CNNVD-201809-1253 // NVD: CVE-2018-0485

CREDITS

The vendor reported this issue.

Trust: 0.3

sources: BID: 105433

SOURCES

db:CNVDid:CNVD-2018-20258
db:VULHUBid:VHN-118687
db:BIDid:105433
db:JVNDBid:JVNDB-2018-013491
db:CNNVDid:CNNVD-201809-1253
db:NVDid:CVE-2018-0485

LAST UPDATE DATE

2024-11-23T21:38:16.023000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2018-20258date:2018-09-30T00:00:00
db:VULHUBid:VHN-118687date:2019-10-09T00:00:00
db:BIDid:105433date:2018-09-26T00:00:00
db:JVNDBid:JVNDB-2018-013491date:2019-02-21T00:00:00
db:CNNVDid:CNNVD-201809-1253date:2019-10-17T00:00:00
db:NVDid:CVE-2018-0485date:2024-11-21T03:38:19.810

SOURCES RELEASE DATE

db:CNVDid:CNVD-2018-20258date:2018-09-30T00:00:00
db:VULHUBid:VHN-118687date:2018-10-05T00:00:00
db:BIDid:105433date:2018-09-26T00:00:00
db:JVNDBid:JVNDB-2018-013491date:2019-02-21T00:00:00
db:CNNVDid:CNNVD-201809-1253date:2018-09-28T00:00:00
db:NVDid:CVE-2018-0485date:2018-10-05T14:29:05.777