CVE-2018-0309
A vulnerability in the implementation of a specific CLI command and the associated Simple Network Management Protocol (SNMP) MIB for Cisco NX-OS (in standalone NX-OS mode) on Cisco Nexus 3000 and 9000 Series Switches could allow an authenticated, remote attacker to exhaust system memory on an affected device, resulting in a denial of service (DoS) condition. The vulnerability is due to the incorrect implementation of the CLI command, resulting in a failure to free all allocated memory upon completion. An attacker could exploit this vulnerability by authenticating to the affected device and repeatedly issuing a specific CLI command or sending a specific SNMP poll request for a specific Object Identifier (OID). A successful exploit could allow the attacker to cause the IP routing process to restart or to cause a device reset, resulting in a DoS condition. Cisco Bug IDs: CSCvf23136.
Published : 2018-06-21 11:29 Updated : 2019-10-09 23:31
CVSS Score
More info
Score 6.8 / 10
A vulnerability exploitable with network access means the vulnerable software is bound to the network stack and the attacker does not require local network access or local access. Such a vulnerability is often termed "remotely exploitable". An example of a network attack is an RPC buffer overflow.
Specialized access conditions or extenuating circumstances do not exist. The following are examples:
- The affected product typically requires access to a wide range of systems and users, possibly anonymous and untrusted (e.g., Internet-facing web or mail server).
- The affected configuration is default or ubiquitous.
- The attack can be performed manually and requires little skill or additional information gathering.
- The race condition is a lazy one (i.e., it is technically a race but easily winnable).
The vulnerability requires an attacker to be logged into the system (such as at a command line or via a desktop session or web interface).
There is no impact to the confidentiality of the system.
There is no impact to the integrity of the system.
There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.
Vendor | Product | Version | URI |
---|---|---|---|
Cisco | Nx-os | 7.0%283%29i5%282%29 | cpe:/o:cisco:nx-os:7.0%283%29i5%282%29 |
Cisco | Nx-os | 7.0%283%29i6%281%29 | cpe:/o:cisco:nx-os:7.0%283%29i6%281%29 |
-
Cisco (1) Search CVE
-
Nx-os (2) Search CVE
-
7.0%283%29i5%282%29
-
7.0%283%29i6%281%29
-
-
References
History of changes
Date | Event | ||||
---|---|---|---|---|---|
2018-08-20 20:16 |
2 changed
|
||||
2018-06-24 01:29 |
1 added
|
||||
2018-06-21 11:29 |
New CVE |